03-12-2018 09:18 AM - edited 03-20-2019 09:58 PM
Ciao,
Do you know if there's any (temporarily) mitigation for this bug except the upgrading to 5.8?
For example: Is the bug exploitable only using the ACS GUI? In this case I could restrict the admin GUI access.
On the other hand, I've not seen any IPS signature for this bug. Right?
Thanks
03-13-2018 04:54 AM
Hi,
good question, I need to know how is this vulnerability exploitable? Usually ACS is not remotely accessible, except for admin (ssh and https) and network devices (radius, tacacs). Which protocol is vulnerable? Thanks.
03-14-2018 03:53 AM
Ciao,
I'm going to open a TAC....
03-14-2018 04:52 AM
Great, once you have some answers, if possible, share the knowledge please. Thanks.
03-19-2018 07:10 AM
Ciao,
bad news, the TAC replay me :
Problem Description: Need information related to CSCvh25988.
Action Plan: There are no workarounds or temporary mitigation steps that could address this vulnerability.
In order to fix this vulnerability, you need to upgrade your ACS to 5.8 patch 9.
Nothing else.
On my side I found out that Talos has released this signature:
* 3:45870 <-> ENABLED <-> SERVER-WEBAPP Cisco ACS unsafe Java object deserialization attempt (server-webapp.rules)
but I don't understand how the signature is blocking the attack.
03-19-2018 07:48 AM
Well at least some information... from the signature, I can see that it match only on destination service HTTP-PORTS. So it probably means, that this vulnerability can be exploited only through web interface (admin access). That is not bad, usually admin access is behind firewall and allowed only to specific hosts... Thank you.
03-19-2018 08:55 AM
What does it mean? In case a matching every time you access to the ACS GUI?
Thanks
03-20-2018 12:22 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide