Cisco Secure Access Control System TACACS+ Authentication Bypass (cisco-sa-20121107-acs)

medium Nessus Plugin ID 69135

Synopsis

The remote host is missing a vendor-supplied security patch.

Description

The version of Cisco Secure Access Control (ACS) running on the remote host has an authentication bypass vulnerability. When the system is configured with an LDAP external identity store and TACACS+ is the authentication protocol, the user-supplied password is not properly validated. A remote attacker could exploit this to authenticate as a known user to any system using TACACS+ in conjunction with an affected Cisco Secure ACS.

Solution

Upgrade to the relevant Cisco Secure Access Control System version referenced in Cisco Security Advisory cisco-sa-20121107-acs.

See Also

http://www.nessus.org/u?cf1f3435

Plugin Details

Severity: Medium

ID: 69135

File Name: cisco-sa-20121107-acs.nasl

Version: 1.7

Type: local

Family: CISCO

Published: 7/30/2013

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:cisco:secure_acs

Required KB Items: Host/Cisco/ACS/Version, Host/Cisco/ACS/DisplayVersion

Exploit Ease: No known exploits are available

Patch Publication Date: 11/7/2012

Vulnerability Publication Date: 11/7/2012

Reference Information

CVE: CVE-2012-5424

BID: 56433

CISCO-SA: cisco-sa-20121107-acs

CISCO-BUG-ID: CSCuc65634