CVE-2014-0650

The web interface in Cisco Secure Access Control System (ACS) 5.x before 5.4 Patch 3 allows remote attackers to execute arbitrary operating-system commands via a request to this interface, aka Bug ID CSCue65962.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:secure_access_control_system:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.3.0.40.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.3.0.40.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.3.0.40.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.3.0.40.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.3.0.40.5:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.3.0.40.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.3.0.40.7:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.3.0.40.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.3.0.40.9:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_system:5.4.0.46.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:02

Type Values Removed Values Added
References () http://osvdb.org/102115 - () http://osvdb.org/102115 -
References () http://secunia.com/advisories/56213 - () http://secunia.com/advisories/56213 -
References () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140115-csacs - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140115-csacs - Vendor Advisory
References () http://tools.cisco.com/security/center/viewAlert.x?alertId=32380 - Vendor Advisory () http://tools.cisco.com/security/center/viewAlert.x?alertId=32380 - Vendor Advisory
References () http://www.securityfocus.com/bid/64964 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/64964 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1029634 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1029634 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/90432 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/90432 -

Information

Published : 2014-01-16 19:55

Updated : 2024-11-21 02:02


NVD link : CVE-2014-0650

Mitre link : CVE-2014-0650

CVE.ORG link : CVE-2014-0650


JSON object : View

Products Affected

cisco

  • secure_access_control_system
CWE
CWE-20

Improper Input Validation