CVE-2014-2130

Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka Bug ID CSCuj83189.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:secure_access_control_system:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:05

Type Values Removed Values Added
References () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2130 - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2130 - Vendor Advisory
References () http://www.securitytracker.com/id/1031844 - () http://www.securitytracker.com/id/1031844 -

Information

Published : 2015-03-06 02:59

Updated : 2024-11-21 02:05


NVD link : CVE-2014-2130

Mitre link : CVE-2014-2130

CVE.ORG link : CVE-2014-2130


JSON object : View

Products Affected

cisco

  • secure_access_control_system
CWE
CWE-264

Permissions, Privileges, and Access Controls