First published: Fri Apr 01 2011(Updated: )
The web-based management interface in Cisco Secure Access Control System (ACS) 5.1 before 5.1.0.44.6 and 5.2 before 5.2.0.26.3 allows remote attackers to change arbitrary user passwords via unspecified vectors, aka Bug ID CSCtl77440.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Access Control System | =5.2 | |
Cisco Secure Access Control System | =5.2.0.26 | |
Cisco Secure Access Control System | =5.1.0.44.2 | |
Cisco Secure Access Control System | =5.1.0.44 | |
Cisco Secure Access Control System | =5.1.0.44.5 | |
Cisco Secure Access Control System | =5.1.0.44.3 | |
Cisco Secure Access Control System | =5.1.0.44.1 | |
Cisco Secure Access Control System | =5.2.0.26.2 | |
Cisco Secure Access Control System | =5.1 | |
Cisco Secure Access Control System | =5.2.0.26.1 | |
Cisco Secure Access Control System | =5.1.0.44.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0951 is classified as a high-severity vulnerability that allows attackers to change arbitrary user passwords.
To mitigate CVE-2011-0951, you should upgrade to Cisco Secure Access Control System version 5.2.0.26.3 or later, or 5.1.0.44.6 or later.
CVE-2011-0951 affects Cisco Secure Access Control System versions 5.1 and 5.2 prior to their respective patched releases.
CVE-2011-0951 facilitates remote attacks that can lead to unauthorized password changes for users.
There is no documented workaround for CVE-2011-0951, so the recommended action is to apply the software update.