SB2017021705 - Multiple vulnerabilities in Cisco Secure Access Control System (ACS)



SB2017021705 - Multiple vulnerabilities in Cisco Secure Access Control System (ACS)

Published: February 17, 2017

Security Bulletin ID SB2017021705
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) XML injection (CVE-ID: CVE-2017-3839)

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to insufficient sanitization of user-supplied data passed in Cisco Secure Access Control System (ACS) when parsing XML files. A remote attacker can send a specially crafted XML file and obtain potentially sensitive information.


2) Information disclosure (CVE-ID: CVE-2017-3841)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists in Cisco Secure Access Control System (ACS) due to improper security restrictions. A remote attacker can directly access certain pages and obtain potentially sensitive information.

3) Open redirect (CVE-ID: CVE-2017-3840)

The disclosed vulnerability allows a remote attacker to perform phishing attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data when redirecting users to external websites. A remote attacker can trick the victim to follow a specially crafted link and perform phishing attacks.


4) DOM-based cross-site scripting (CVE-ID: CVE-2017-3838)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in Cisco Secure Access Control System (ACS). A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


Remediation

Install update from vendor's website.