Advisory

Cisco NAC Appliance (Cisco Clean Access / Perfigo) authentication cross-site scripting (XSS)

Dell SecureWorks Security Advisory SWRX-2013-001

Advisory Information

  • Title: Cisco NAC Appliance (Cisco Clean Access / Perfigo) authentication cross-site scripting (XSS)
  • Advisory ID: SWRX-2013-001
  • Date published: Wednesday, January 30, 2013
  • CVE: CVE-2012-6029
  • CVSS v2 base score: 4.3
  • Date of last update: Wednesday, January 30, 2013
  • Vendors contacted: Cisco Systems, Inc.
  • Release mode: Coordinated
  • Discovered by: Craig Lambert, Dell SecureWorks

Summary

The Cisco NAC Appliance (formerly, Cisco Clean Access) “enforces security policy compliance on all devices that attempt to gain access” to organizations’ infrastructure. A common application of Cisco NAC is to “provide easy and secure guest access.” A vulnerability exists in the web-based authentication functions of Cisco NAC Appliance versions up to and including 4.9.2. The vulnerability involves insufficient input validation of URL parameters. Successful exploitation may allow an attacker to retrieve session cookies, steal recently submitted data, or launch additional attacks.

Download the PDF: SWRX-2013-001

PGP Signature


ABOUT THE AUTHOR
カウンター・スレット・ユニット・リサーチチーム

The Secureworks Counter Threat Unit™ (CTU) is a dedicated threat research team that analyzes threat data across our global customer base and actively monitors the threat landscape.
ブログ記事一覧ページに戻る

今すぐ Taegis をお試しください

ご確認ください:Taegis がリスクを軽減し、既存のセキュリティ投資を最適化し、人材不足を解消することがどのようにできるかをデモでご覧ください。