6.5
CVSSv2

CVE-2015-6345

Published: 30/10/2015 Updated: 07/12/2016
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

A vulnerability in the Cisco Secure Access Control Server (ACS) interface could allow an authenticated, remote malicious user to impact the confidentiality of the system by executing arbitrary SQL queries. The vulnerability is due to a lack of input validation on user-supplied input within SQL queries. An attacker could exploit this vulnerability by sending crafted URLs that contain malicious SQL statements to the affected system. A successful exploit could allow the malicious user to determine the presence of certain values in the database. Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs

Vulnerable Product Search on Vulmon Subscribe to Product

cisco secure access control server 5.7.0.15

Vendor Advisories

A vulnerability in the Cisco Secure Access Control Server (ACS) interface could allow an authenticated, remote attacker to impact the confidentiality of the system by executing arbitrary SQL queries The vulnerability is due to a lack of input validation on user-supplied input within SQL queries An attacker could exploit this vulnerability by se ...