First published: Thu Mar 08 2018(Updated: )
A vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) prior to release 5.8 patch 9 could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object. An exploit could allow the attacker to execute arbitrary commands on the device with root privileges. Cisco Bug IDs: CSCvh25988.
Credit: ykramarz@cisco.com psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Access Control System | =5.2\(0.3\) | |
Cisco Secure ACS Solution Engine | ||
=5.2\(0.3\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0147 is classified as a critical vulnerability due to its potential to allow remote code execution.
To resolve CVE-2018-0147, update Cisco Secure Access Control System to version 5.8 patch 9 or later.
CVE-2018-0147 affects Cisco Secure Access Control System versions prior to 5.8 patch 9.
Yes, CVE-2018-0147 can be exploited by unauthenticated remote attackers.
CVE-2018-0147 is an object deserialization vulnerability that can lead to arbitrary command execution.