Remote Code Execution Vulnerability in Cisco Secure Access Control Server
CVE-2018-0218

3.3LOW

Key Information:

Vendor
Cisco
Vendor
CVE Published:
8 March 2018

Summary

A vulnerability exists in the web-based user interface of Cisco Secure Access Control Server versions prior to 5.8 patch 9, allowing an unauthenticated remote attacker to gain unauthorized read access to system information. This weakness arises from improper handling of XML External Entities (XXEs) during XML file parsing. By convincing an administrator to import a specially crafted XML file, an attacker could exploit the vulnerability to expose sensitive data.

Affected Version(s)

Cisco Secure Access Control Server Cisco Secure Access Control Server

References

CVSS V3.1

Score:
3.3
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.