6.3
CVSSv2

CVE-2014-0667

Published: 16/01/2014 Updated: 29/08/2017
CVSS v2 Base Score: 6.3 | Impact Score: 6.9 | Exploitability Score: 6.8
VMScore: 561
Vector: AV:N/AC:M/Au:S/C:C/I:N/A:N

Vulnerability Summary

A vulnerability in the Remote Method Invocation (RMI) interface of the Cisco Secure Access Control System (ACS) could allow an authenticated, remote malicious user to read arbitrary files on the Cisco Secure ACS server. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by accessing the Cisco Secure ACS via the RMI interface. An exploit could allow the malicious user to read arbitrary files located on the Cisco Secure ACS. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker must authenticate to a targeted device. This access requirement reduces the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco secure access control system -

Vendor Advisories

A vulnerability in the Remote Method Invocation (RMI) interface of the Cisco Secure Access Control System (ACS) could allow an authenticated, remote attacker to read arbitrary files on the Cisco Secure ACS server The vulnerability is due to insufficient authorization enforcement An attacker could exploit this vulnerability by accessing the Cis ...