Cisco plugs ACS password security hole
Networking giant issues patch to stop hackers bypassing password protection in Access Control System.
Networking titan Cisco has patched a vulnerability in its Access Control System (ACS) platform that could allow hackers to bypass password protections.
The update installs a revision of ACS, a part of which handles the platform’s TACACS+ authentication platform.
Cisco said the vulnerability was caused by the improper validation of the user-supplied passwords when TACACS+ is the authentication protocol and Cisco Secure ACS is configured with a Lightweight Directory Access Protocol (LDAP) external identity store.
An attacker may exploit this vulnerability by sending a special sequence of characters when prompted for the user password.
They would then need to know a valid username stored in the LDAP external identity database to exploit this vulnerability, and the exploitation is limited to impersonate only that user.
An exploit could allow the attacker to successfully authenticate to any system using TACACS+ in combination with an affected Cisco Secure ACS.
The update is free to download and install with Cisco urging organisations to install the fix as soon as possible.
The flaw was initally flagged by Sans security researcher Mark Baggett.
Baggett said exploitation of the vulnerability was “very easy”.
“If you are using Cisco ACS for authentication you should probably take note of this announcement,” he said.
News of the flaw in Cisco’s ACS comes around a week after the company was forced to issue patches in its datacentre and web conferencing products that could allow remote command execution in its Cisco Prime Data Center Network Manager.
Versions prior to 6.1.1 are vulnerable to remote exploits on the underlying system that hosts the application, according to Cisco.
It also reported a SQL injection and buffer overrun vulnerability in its Cisco Unified MeetingPlace Web Conferencing product.