Cisco Secure Access Control Server 5.5 Reflected cross site scripting

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.1 | $0-$5k | 0.00 |
Summary
A vulnerability described as problematic has been identified in Cisco Secure Access Control Server 5.5. This impacts an unknown function. Such manipulation leads to cross site scripting (Reflected). This vulnerability is listed as CVE-2014-8028. The attack may be performed from remote. In addition, an exploit is available. Applying a patch is advised to resolve this issue.
Details
A vulnerability, which was classified as problematic, has been found in Cisco Secure Access Control Server 5.5 (Network Management Software). Affected by this issue is an unknown code block. The manipulation with an unknown input leads to a cross site scripting vulnerability (Reflected). Using CWE to declare the problem leads to CWE-79. The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Impacted is integrity. CVE summarizes:
Multiple cross-site scripting (XSS) vulnerabilities in the web framework in Cisco Secure Access Control System (ACS) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuq79019.
The weakness was presented 01/08/2015 with Cisco as CSCuq79019 as confirmed security notice (Website). The advisory is shared for download at tools.cisco.com. This vulnerability is handled as CVE-2014-8028 since 10/08/2014. The attack may be launched remotely. No form of authentication is required for exploitation. Successful exploitation requires user interaction by the victim. Technical details are unknown but an exploit is available. The MITRE ATT&CK project declares the attack technique as T1059.007.
It is declared as highly functional.
Applying the patch 5.5 Patch 7 is able to eliminate this problem. The bugfix is ready for download at software.cisco.com.
The vulnerability is also documented in the databases at X-Force (100553), SecurityFocus (BID 71946†), Secunia (SA62159†) and SecurityTracker (ID 1031515†). tools.cisco.com is providing further details. See VDB-68522 and VDB-68527 for similar entries. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.3VulDB Meta Temp Score: 4.1
VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Name: ReflectedClass: Cross site scripting / Reflected
CWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Highly functional
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: 5.5 Patch 7
Timeline
10/08/2014 🔍01/08/2015 🔍
01/08/2015 🔍
01/08/2015 🔍
01/09/2015 🔍
01/09/2015 🔍
01/09/2015 🔍
07/09/2017 🔍
Sources
Vendor: cisco.comAdvisory: CSCuq79019
Organization: Cisco
Status: Confirmed
CVE: CVE-2014-8028 (🔍)
GCVE (CVE): GCVE-0-2014-8028
GCVE (VulDB): GCVE-100-68528
X-Force: 100553 - Cisco Secure Access Control Server multiple cross-site scripting, Medium Risk
SecurityFocus: 71946 - Cisco Secure Access Control Server CVE-2014-8028 Multiple Cross Site Scripting Vulnerabilities
Secunia: 62159 - Cisco Secure Access Control Server Multiple Vulnerabilities, Less Critical
SecurityTracker: 1031515 - Cisco Secure Access Control Server Input Validation Flaws Permit Cross-Site Scripting Attacks
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
See also: 🔍
Entry
Created: 01/09/2015 15:44Updated: 07/09/2017 08:18
Changes: 01/09/2015 15:44 (62), 07/09/2017 08:18 (11)
Complete: 🔍
Cache ID: 216:F5B:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.