Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) provide authentication, authorization, and accounting (AAA) services to network devices such as a network access server, Cisco PIX and a router. This advisory documents multiple Denial of Service (DoS) and authentication related vulnerabilities for the ACS Windows and the ACS Solution Engine servers. The vulnerabilities are documented as these Cisco bug IDs: CSCeb60017 ( registered customers only) CSCec66913 ( registered customers only) CSCec90317 ( registered customers only) CSCed81716 ( registered customers only) CSCef05950 ( registered customers only) This advisory will be posted at http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040825-acs.
Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) provide authentication, authorization, and accounting (AAA) services to network devices such as a network access server, Cisco PIX and a router. This advisory documents multiple Denial of Service (DoS) and authentication related vulnerabilities for the ACS Windows and the ACS Solution Engine servers.
The vulnerabilities are documented as these Cisco bug IDs:
This advisory will be posted at http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040825-acs.
This section provides details on affected products.
These products are vulnerable:
CSCed81716 is only applicable to the ACS Solution Engine.
Successfully authenticate to your ACS box to determine your software revision. After you perform the authentication, the first screen displays the current ACS version in this format—CiscoSecure ACS Release 3.2(3) Build 11.
ACS versions may also be displayed as 003.002(003.011), where "011" is the build number referenced on the ACS graphical user interface (GUI).
Cisco Secure ACS for UNIX is not affected by these vulnerabilities. No other Cisco products are currently known to be affected by these vulnerabilities.
The Cisco Secure ACS products provide a centralized identity networking solution and simplified user management experience across all Cisco devices and security management applications. The products help to ensure enforcement of assigned policies—they allow network administrators to control who can log into the network, per user privileges in the network, security auditing and billing information, and command level access controls.
This section describes workarounds for these vulnerabilities.
Refer to /en/US/products/sw/secursw/ps2086/products_user_guide_chapter09186a0080205a43.html#wp89030 for information on how to set up an access policy on the Cisco ACS.
When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center ("TAC") or your contracted maintenance provider for assistance.
DDTs Bug ID |
Impacted Versions |
Fixed Versions |
Platform |
---|---|---|---|
CSCeb60017 ( registered customers only) |
3.2(1), 3.2(2) |
003.002(002.020) or later, 3.2(3) in Product Upgrade Tool |
ACS Windows and ACS Solution Engine |
CSCec66913 ( registered customers only) |
3.2(1), 3.2(2) |
003.002(002.020) or later, 3.2(3) in Product Upgrade Tool |
ACS Windows and ACS Solution Engine |
CSCec90317 ( registered customers only) |
3.2(1) |
003.002(002.005) or later, 3.2(2) in Product Upgrade Tool |
ACS Windows and ACS Solution Engine |
CSCed81716 ( registered customers only) |
3.2(1), 3.2(2) |
003.002(003.011) or later, 3.2(3) in Product Upgrade Tool |
ACS Solution Engine only |
CSCef05950 ( registered customers only) |
3.0(x), 3.1(x), 3.2(x), 3.3(1) |
There are patches available to address this vulnerability for versions 3.1(2), 3.2(3) and 3.3(1). See the Customers with Service Contracts section below for details on the location of these patches. Although version 3.0 is affected, the fix is only available with a feature set included in versions 3.1 and higher. Customers without Service Contracts will need to contact Cisco Technical Assistance Center at the numbers listed below for assistance. |
ACS Windows and ACS Solution Engine |
Upgrade procedures can be found as indicated:
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability described in this advisory.
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Revision 1.3 |
2007-August-14 |
Fixed link. |
Revision 1.2 |
2004-October-05 |
Clarified impact of Denial of Service vulnerabilities in the Impact section. Added the Impacted Versions column and added content to the Fixed Versions column in the Software Versions and Fixes section table. Clarified version 3.0(x) status in the Software Versions and Fixes section. |
Revision 1.1 |
2004-August-25 |
Changed URLs in the Obtaining Fixed Software section. |
Revision 1.0 |
2004-August-25 |
Initial public release. |
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.