First published: Thu Nov 30 2017(Updated: )
A vulnerability in the web-based interface of Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to view sensitive information on an affected system. The vulnerability exists because the affected software does not sufficiently protect system software version information when the software responds to HTTP requests that are sent to the web-based interface of the software. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based interface of the affected software. A successful exploit could allow the attacker to view sensitive information about the software, which the attacker could use to conduct additional reconnaissance attacks. Cisco Bug IDs: CSCvf66155.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Access Control System | =5.8\(0.32\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12354 has been rated as a high severity vulnerability due to the potential for unauthenticated access to sensitive information.
To remediate CVE-2017-12354, it is recommended to upgrade to the patched version of Cisco Secure Access Control System.
The risk associated with CVE-2017-12354 is that an unauthenticated remote attacker could exploit the vulnerability to gain unauthorized access to sensitive data.
CVE-2017-12354 affects Cisco Secure Access Control System version 5.8(0.32).
CVE-2017-12354 allows for information disclosure attacks that can lead to unauthorized viewing of sensitive system information.