First published: Sat Jan 25 2014(Updated: )
The portal interface in Cisco Secure Access Control System (ACS) does not properly manage sessions, which allows remote authenticated users to hijack sessions and gain privileges via unspecified vectors, aka Bug ID CSCue65951.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Access Control System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0678 is classified as a high-severity vulnerability due to its potential for session hijacking.
To fix CVE-2014-0678, apply the latest patches and updates provided by Cisco for the Secure Access Control System.
CVE-2014-0678 affects users of Cisco Secure Access Control System, particularly remote authenticated users.
CVE-2014-0678 enables session hijacking, allowing remote authenticated users to gain unauthorized privileges.
Currently, there are no documented workarounds for CVE-2014-0678; applying the security updates is recommended.