First published: Fri Oct 30 2015(Updated: )
The report-generation web interface in the Solution Engine in Cisco Secure Access Control Server (ACS) 5.7(0.15) allows remote authenticated users to bypass intended RBAC restrictions, and read report or status information, by visiting an unspecified web page.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Access Control Server | =5.7.0.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6348 has a high severity rating due to the potential for unauthorized access to sensitive report information.
To fix CVE-2015-6348, upgrade Cisco Secure Access Control Server to version 5.7(0.16) or later, which addresses the RBAC bypass.
CVE-2015-6348 affects users of Cisco Secure Access Control Server version 5.7(0.15) and earlier.
Exploiting CVE-2015-6348 allows authenticated users to bypass RBAC restrictions and access sensitive reports.
There is no documented workaround for CVE-2015-6348; upgrading to a patched version is the recommended approach.