First published: Fri Oct 30 2015(Updated: )
The Solution Engine in Cisco Secure Access Control Server (ACS) 5.7(0.15) allows remote authenticated users to bypass intended RBAC restrictions, and create a dashboard or portlet, by visiting an unspecified web page.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Access Control Server | =5.7.0.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6347 is classified as a medium severity vulnerability.
To mitigate CVE-2015-6347, upgrade Cisco Secure Access Control Server to version 5.7(0.16) or later.
CVE-2015-6347 affects remote authenticated users of Cisco Secure Access Control Server version 5.7(0.15).
The main impact of CVE-2015-6347 is the bypassing of role-based access control (RBAC) restrictions.
The vulnerable software version for CVE-2015-6347 is Cisco Secure Access Control Server 5.7(0.15).