Preview Tool

Cisco Bug: CSCux34781 - Evaluation of acs5 for Java_December_2015

Last Modified

Mar 08, 2018

Products (1)

  • Cisco Secure Access Control Server Solution Engine

Known Affected Releases

5.5(0.46.10) 5.6(0.22.4) 5.7(0.15) 5.8(0.32)

Description (partial)

Cisco Secure Access Control System (ACS)  includes a version of Commons Collections library that is affected by the vulnerability identified by the Common Vulnerability and Exposures (CVE) IDs:


This product is affected by the listed CVE id.

Exposure is not configuration dependent.
All portal pages on the ACS are equally vulnerable.
In order to exploit this vulnerability against ACS, an attacker would have to first successfully authenticate to one of the ACS portal pages. ACS will not accept any data from untrusted sources without authentication.

All patches and revisions of 5.5, 5.6, 5.7 and 5.8 are vulnerable.

Related Community Discussions

Cisco ACS <key>CSCux34781</key>
Hello, I was curious if ACS version 5.8.1 is affected by this bug. We recently upgraded to 5.8.1 from and wanted to confirm that 5.8.1 is vulnerable or not. Thanks
Latest activity: Mar 31, 2017
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.