Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2ccw-7gjg-m467

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

A vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) prior to release 5.8 patch 9 could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object. An exploit could allow the attacker to execute arbitrary commands on the device with root privileges. Cisco Bug IDs: CSCvh25988.

A vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) prior to release 5.8 patch 9 could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object. An exploit could allow the attacker to execute arbitrary commands on the device with root privileges. Cisco Bug IDs: CSCvh25988.

EPSS

Процентиль: 86%
0.03003
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-502

Связанные уязвимости

CVSS3: 9.8
nvd
почти 8 лет назад

A vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) prior to release 5.8 patch 9 could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object. An exploit could allow the attacker to execute arbitrary commands on the device with root privileges. Cisco Bug IDs: CSCvh25988.

CVSS3: 9.8
fstec
почти 8 лет назад

Уязвимость программного средства управления доступом Cisco Secure Access Control System, связанная с восстановлением в памяти недостоверной структуры данных, позволяющая нарушителю выполнять произвольные команды с привилегиями root

EPSS

Процентиль: 86%
0.03003
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-502