Описание
Format string vulnerability in the administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to crash the CSADMIN module only (denial of service of administration function) or execute arbitrary code via format strings in the URL to port 2002.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:cisco:secure_access_control_server:2.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:3.0.1:*:*:*:*:*:*:*
EPSS
Процентиль: 85%
0.02343
Низкий
7.5 High
CVSS2
Дефекты
CWE-134
Связанные уязвимости
github
почти 4 года назад
Format string vulnerability in the administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to crash the CSADMIN module only (denial of service of administration function) or execute arbitrary code via format strings in the URL to port 2002.
EPSS
Процентиль: 85%
0.02343
Низкий
7.5 High
CVSS2
Дефекты
CWE-134