⚠ Actively exploited
Added to CISA KEV on 2022-03-25. Federal agencies required to patch by 2022-04-15. Required action: Apply updates per vendor instructions..
Severity
9.8CRITICAL
EPSS
4.0%
top 11.65%
CISA KEV
KEV
Added 2022-03-25
Due 2022-04-15
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedMar 8
KEV addedMar 25
KEV dueApr 15
Latest updateMay 13
CISA Required Action: Apply updates per vendor instructions.

Description

A vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) prior to release 5.8 patch 9 could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object. An exploit could allow the attacker to execute arbitrary commands on the device with ro

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5cisco_secure_access_control_systemCisco Secure Access Control System

🔴Vulnerability Details

3
GHSA
GHSA-2ccw-7gjg-m467: A vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) prior to release 52022-05-13
CVEList
CVE-2018-0147: A vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) prior to release 52018-03-08
VulnCheck
Cisco Secure Access Control System Java Deserialization Vulnerability2018

📋Vendor Advisories

2
CISA
Cisco Secure Access Control System Java Deserialization Vulnerability2022-03-25
Cisco
Cisco Secure Access Control System Java Deserialization Vulnerability2018-03-08
CVE-2018-0147 (CRITICAL CVSS 9.8) | A vulnerability in Java deserializa | cvebase.io