4
CVSSv2

CVE-2013-6695

Published: 02/12/2013 Updated: 04/03/2014
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

A vulnerability in the role-based access control code of the Cisco Secure Access Control System (ACS) could allow an authenticated, remote malicious user to access support bundle information. The vulnerability is due to a failure to check the user privileges correctly when downloading the support bundle. An attacker could exploit this vulnerability by downloading the support bundle without the appropriate user privileges. An exploit could allow the unprivileged malicious user to download the support bundle and access sensitive information such as the user database. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker must authenticate to the affected device. The access requirement decreases the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco secure access control system -

Vendor Advisories

A vulnerability in the role-based access control code of the Cisco Secure Access Control System (ACS) could allow an authenticated, remote attacker to access support bundle information The vulnerability is due to a failure to check the user privileges correctly when downloading the support bundle An attacker could exploit this vulnerability by do ...