
Revised: November 9, 2016These release notes pertain to the Cisco Secure Access Control System (ACS), Release 5.6, hereafter referred to as ACS 5.6. This vulnerability is first fixed in Cisco Secure ACS for Windows release 4.2.1.15.11.Ĭisco Secure ACS for Windows can be downloaded from the Software Center on Cisco.Release Notes for Cisco Secure Access Control System 5.6 If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. When considering software upgrades, customers are advised to consult the Cisco Security Advisories, Responses, and Notices archive at and review subsequent advisories to determine exposure and a complete upgrade solution. This vulnerability has been documented in Cisco bug ID CSCui57636 ( registered customers only) for the Cisco Secure ACS and has been assigned the Common Vulnerabilities and Exposures (CVE) ID CVE-2013-3466. An exploit could allow the attacker to execute arbitrary commands on the Cisco Secure ACS server and take full control of the affected server.Ĭommands are executed in the context of the System user for Cisco Secure ACS authentication service running on Microsoft Windows.Ĭisco Secure ACS uses the standard RADIUS UDP port 1812 or 1645 for EAP-FAST authentication. An attacker could exploit this vulnerability by sending crafted EAP-FAST packets to an affected device. The vulnerability is due to improper parsing of user identities used for EAP-FAST authentication.

This vulnerability is only present when Cisco Secure ACS is configured as a RADIUS server. A vulnerability in the EAP-FAST authentication module of Cisco Secure Access Control Server (ACS) versions 4.0 through 4.2.1.15 could allow an unauthenticated, remote attacker to execute arbitrary commands on the Cisco Secure ACS server.
