CVE-2018-0147
CRITICAL KEVCisco Secure Access Control System - Insecure Deserialization
Title source: ruleDescription
A vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) prior to release 5.8 patch 9 could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object. An exploit could allow the attacker to execute arbitrary commands on the device with root privileges. Cisco Bug IDs: CSCvh25988.
References (4)
Scores
CVSS v3
9.8
EPSS
0.0402
EPSS Percentile
88.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2022-03-25
VulnCheck KEV
2022-03-16
InTheWild.io
2022-03-25
ENISA EUVD
EUVD-2018-0970
Classification
CWE
CWE-502
CWE-20
Status
published
Affected Products (1)
cisco/secure_access_control_system
Timeline
Published
Mar 08, 2018
KEV Added
Mar 25, 2022
Tracked Since
Feb 18, 2026