The web-based management interface in Cisco Secure Access Control System (ACS) 5.1 before 5.1.0.44.6 and 5.2 before 5.2.0.26.3 allows remote attackers to change arbitrary user passwords via unspecified vectors, aka Bug ID CSCtl77440.
Published 2011-04-04 12:27:37
Updated 2017-08-17 01:33:45
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2011-0951

Probability of exploitation activity in the next 30 days: 1.47%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 85 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2011-0951

  • Cisco Secure ACS Unauthorized Password Change
    First seen: 2020-07-16
    auxiliary/admin/networking/cisco_secure_acs_bypass
    This module exploits an authentication bypass issue which allows arbitrary password change requests to be issued for any user in the local store. Instances of Secure ACS running version 5.1 with patches 3, 4, or 5 as well as version 5.2 with either no patches
  • Cisco Secure ACS Unauthorized Password Change
    First seen: 2020-04-26
    auxiliary/admin/cisco/cisco_secure_acs_bypass
    auxiliary/admin/cisco/cisco_secure_acs_bypass This module exploits an authentication bypass issue which allows arbitrary password change requests to be issued for any user in the local store. Instances of Secure ACS running version 5.1 with patches 3, 4, or 5 as well

CVSS scores for CVE-2011-0951

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
5.0
MEDIUM AV:N/AC:L/Au:N/C:N/I:P/A:N
10.0
2.9
NIST

CWE ids for CVE-2011-0951

  • Assigned by: nvd@nist.gov (Primary)

References for CVE-2011-0951

Products affected by CVE-2011-0951

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!