The Cisco NAC Appliance (formerly, Cisco Clean Access) “enforces security policy compliance on all devices that attempt to gain access” to organizations’ infrastructure. A common application of Cisco NAC is to “provide easy and secure guest access.” A vulnerability exists in the web-based authentication functions of Cisco NAC Appliance versions up to and including 4.9.2. The vulnerability involves insufficient input validation of URL parameters. Successful exploitation may allow an attacker to retrieve session cookies, steal recently submitted data, or launch additional attacks.
PGP Signature (PC Users: You may need to right click your mouse and select "Save As" or "Save Target As" and then open with Notepad)