PT-2011-27: Multiple Vulnerabilities in Cisco ACS Web Interface

(PT-2011-27) Positive Technologies Security Advisory 
Multiple Vulnerabilities in Cisco ACS Web Interface

Vulnerable platform

Cisco ACS 
Version: and earlier, and earlier


Severity level

Severity level: Medium 
Impact: Cross-Site Scripting 
Access Vector: Network exploitable 

CVSS v2: 
Base Score: 4.3 
Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVE: CVE-2011-3317

Platform description

Cisco Secure Access Control Server (ACS) is an access policy control platform.

Vulnerability description

Positive Research Center has discovered multiple vulnerabilities in the Cisco ACS web interface.

Cross-site scripting vulnerabilities are triggered when a specially crafted value is assigned to different variables in scripts, which allows one to manage device through Web-interface. This can be exploited to inject malicious code and execute arbitrary HTML or script code in the admin browser session in the context of the device's web management interface.
Malicious users can inject JavaScript, VBScript, ActiveX, HTML, or Flash into a vulnerable application to fool administrators in order to gather data from their machines. An attacker can steal the session cookie and take over the account impersonating an administrator. It is also possible to modify the page content displayed to the administrator or the change device settings.

The details are not disclosed by agreement with the Cisco company.

How to fix

We recommend that you download the latest cumulative patch. The patches for users with service contracts are available through their regular update channels (in most cases, through the Software Center on Cisco's worldwide website at

Users whose Cisco products are provided or maintained through agreements with third-party support organizations should contact that support organization for guidance and assistance.

Fixed software can also be obtained via the Cisco Technical Assistance Center (TAC). Refer to for additional TAC contact information.

Advisory status

28.07.2011 - Vendor is notified 
28.07.2011 - Vendor gets vulnerability details 
13.02.2012 - Vendor releases fixed version and details 
20.02.2012 - Public disclosure


These vulnerabilities were discovered by Maxim Tsoy, Yuriy Goltsev, Alexander Zaitsev, and Evgeniy Tolmachev, Positive Research Center (Positive Technologies Company)


Reports on the vulnerabilities previously discovered by Positive Research:

About Positive Technologies

Positive Technologies is among the key players in the IT security market in Russia.

The principal activities of the company include the development of integrated tools for information security monitoring (MaxPatrol); providing IT security consulting services and technical support; development of the Securitylab leading Russian information security portal.

Among the clients of Positive Technologies, there are more than 40 state enterprises, more than 50 banks and financial organizations, 20 telecommunication companies, more than 40 plant facilities, as well as IT, service and retail companies from Russia, the CIS countries, the Baltic States, China, Ecuador, Germany, Great Britain, Holland, Iran, Israel, Japan, Mexico, the Republic of South Africa, Thailand, Turkey, and the USA.

Positive Technologies is a team of highly skilled developers, advisers and experts with years of vast hands-on experience. The company specialists possess professional titles and certificates; they are the members of various international societies and are actively involved in the IT security field development.