First published: Wed Jun 24 2015(Updated: )
Cisco Secure Access Control System before 5.4(0.46.2) and 5.5 before 5.5(0.46) and Cisco Identity Services Engine 1.0(4.573) do not properly implement access control for support bundles, which allows remote authenticated users to obtain sensitive information via brute-force attempts to send valid credentials, aka Bug IDs CSCue00833 and CSCub40331.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Identity Services Engine | =1.0.4.573 | |
Cisco Secure Access Control System | <=5.4.0.46.1 | |
Cisco Secure Access Control System | =5.3.0.40.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4219 has been assigned a high severity level due to the potential for sensitive information disclosure.
To fix CVE-2015-4219, upgrade to Cisco Secure Access Control System version 5.4(0.46.2) or later, or 5.5 version 5.5(0.46) or later.
CVE-2015-4219 affects Cisco Secure Access Control System versions up to 5.4(0.46.1) and Cisco Identity Services Engine version 1.0(4.573).
CVE-2015-4219 can be exploited through remote authenticated attacks that leverage brute-force techniques to access sensitive information.
To protect against CVE-2015-4219, ensure that your system is updated to the latest available software version and implement robust access control measures.