Cisco Secure Access Control System (ACS) Authentication Bypass Vulnerability
27 Nov. 2012
Summary
Cisco Secure Access Control System (ACS) is prone to an authentication-bypass vulnerability because it fails to properly validate user-supplied password when TACACS+ is the authentication protocol and Cisco Secure ACS is configured with a Lightweight Directory Access Protocol (LDAP) external identity store.
Vulnerable Systems:
* Cisco Secure ACS 5.0 and prior
Cisco Secure Access Control System (ACS) could allow a remote attacker to bypass security restrictions, caused by improper validation of the user-supplied password when TACACS+ is the authentication protocol. If the application is configured with a Lightweight Directory Access Protocol (LDAP) external identity store, an attacker could exploit this vulnerability to impersonate a user to bypass TACACS+ based authentication service.