First published: Fri Oct 05 2018(Updated: )
A vulnerability in the web-based UI of Cisco Secure Access Control Server could allow an authenticated, remote attacker to gain read access to certain information in an affected system. The vulnerability is due to improper handling of XML External Entities (XXEs) when parsing an XML file. An attacker could exploit this vulnerability by convincing the administrator of an affected system to import a crafted XML file.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Access Control Server | <5.8 | |
Cisco Secure Access Control Server | =5.8 | |
Cisco Secure Access Control Server | =5.8-p1 | |
Cisco Secure Access Control Server | =5.8-p2 | |
Cisco Secure Access Control Server | =5.8-p3 | |
Cisco Secure Access Control Server | =5.8-p4 | |
Cisco Secure Access Control Server | =5.8-p5 | |
Cisco Secure Access Control Server | =5.8-p6 | |
Cisco Secure Access Control Server | =5.8-p7 | |
Cisco Secure Access Control Server | =5.8-p8 | |
Cisco Secure Access Control Server | =5.8-p9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0414 is rated as a medium severity vulnerability.
CVE-2018-0414 can allow an authenticated, remote attacker to gain unauthorized read access to sensitive information.
To fix CVE-2018-0414, it is recommended to upgrade Cisco Secure Access Control Server to the latest available version.
CVE-2018-0414 affects Cisco Secure Access Control Server versions prior to 5.8 and including all 5.8 patch versions.
The CVE-2018-0414 vulnerability is due to improper handling of XML External Entities (XXEs) during XML parsing.