Guest

Preview Tool

Cisco Bug: CSCuw24655 - Cisco ACS Role Based Access Control URL Lack of Protection Vulnerability

Last Modified

Feb 09, 2017

Products (1)

  • Cisco Secure Access Control Server Solution Engine

Known Affected Releases

5.7(0.15)

Description (partial)

Symptom:
A vulnerability in the Role Based Access Control (RBAC) implementation of the Cisco Secure Access 
Control Server (ACS) could allow an authenticated, remote attacker to impact the integrity of the system 
by modifying dashboard portlets that should be restricted.

The vulnerability is due to improper RBAC validation when a new administrative dashboard or portlet is 
created. An attacker could exploit this vulnerability by authenticating as a non-privileged user and 
navigating to what should be a restricted web page. An exploit could allow the attacker to create a dashboard
or portlet which should not be allowed.

Conditions:
Device running with default configuration running an affected version of software.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.