Vigil@nce - Cisco ACE 4700, ACE30: read-write access via CLI
October 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An authenticated attacker can use a file and the CLI, to bypass
access restrictions of Cisco ACE 4700 or ACE30, in order to read
or alter data.
– Impacted products: Cisco ACE.
– Severity: 2/4.
– Creation date: 27/08/2015.
– Revision date: 01/09/2015.
DESCRIPTION OF THE VULNERABILITY
An authenticated user on Cisco ACE 4700 / ACE30 can access to the
CLI (command-line interface).
However, an attacker can create a malicious file, copy it on ACE,
and then execute a CLI command line, so data in this file force a
read/write of another file. Technical details are unknown.
An authenticated attacker can therefore use a file and the CLI, to
bypass access restrictions of Cisco ACE 4700 or ACE30, in order to
read or alter data.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Cisco-ACE-4700-ACE30-read-write-access-via-CLI-17759