The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability note CVE-2011-0951

Cisco Secure ACS: password change

Synthesis of the vulnerability

An unauthenticated attacker can change the password of Cisco Secure Access Control System users.
Impacted software: Secure ACS.
Severity of this computer vulnerability: 2/4.
Consequences of an attack: user access/rights, data creation/edition.
Attacker's origin: intranet client.
Creation date: 30/03/2011.
Références of this announce: 112913, 112923, BID-47093, CERTA-2011-AVI-180, cisco-amb-20110330-acs, cisco-sa-20110330-acs, CSCtl77440, CVE-2011-0951, VIGILANCE-VUL-10504.

Description of the vulnerability

The Cisco Secure ACS product processes users' identities.

Users can connect to the web interface, in order to change their password. In order to do so, they have to enter their old password. However, even if this old password is invalid, the new password is applied.

An unauthenticated attacker can therefore change the password of Cisco Secure Access Control System users.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a system vulnerability alert. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.