Cisco NAC Appliance (Cisco Clean Access / Perfigo) authentication cross-site scripting (XSS)

Dell SecureWorks Security Advisory SWRX-2013-001

Advisory Information

  • Title: Cisco NAC Appliance (Cisco Clean Access / Perfigo) authentication cross-site scripting (XSS)
  • Advisory ID: SWRX-2013-001
  • Advisory URL:
  • Date published: Wednesday, January 30, 2013
  • CVE: CVE-2012-6029
  • CVSS v2 base score: 4.3
  • Date of last update: Wednesday, January 30, 2013
  • Vendors contacted: Cisco Systems, Inc.
  • Release mode: Coordinated
  • Discovered by: Craig Lambert, Dell SecureWorks


The Cisco NAC Appliance (formerly, Cisco Clean Access) “enforces security policy compliance on all devices that attempt to gain access” to organizations’ infrastructure. A common application of Cisco NAC is to “provide easy and secure guest access.” A vulnerability exists in the web-based authentication functions of Cisco NAC Appliance versions up to and including 4.9.2. The vulnerability involves insufficient input validation of URL parameters. Successful exploitation may allow an attacker to retrieve session cookies, steal recently submitted data, or launch additional attacks.

Download the PDF

PGP Signature (PC Users: You may need to right click your mouse and select "Save As" or "Save Target As" and then open with Notepad)

SecureWorks CTU Public Key


Next Steps

Contact Us Call Us Today
(877) 838-7947
UK +44 131 260 3044


Online Tools

  • Print this Page
  • Share This Resource

By completing this form you'll be opting in to receiving future communications about products and services from Dell SecureWorks.