PatchSiren

PatchSiren cyber security CVE debrief

CVE-2018-0147 Cisco CVE debrief

CVE-2018-0147 is identified in the supplied official records as a Java deserialization vulnerability affecting Cisco Secure Access Control System (ACS). CISA has added it to the Known Exploited Vulnerabilities catalog, which means it is treated as a known exploitation risk rather than a purely theoretical issue. The KEV entry directs organizations to apply updates per vendor instructions, so any active Cisco ACS deployment should be reviewed promptly for remediation status.

Vendor
Cisco
Product
Secure Access Control System (ACS)
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2022-03-25
Original CVE updated
2022-03-25
Advisory published
2022-03-25
Advisory updated
2022-03-25

Who should care

Security, IT, and identity/access management teams responsible for Cisco Secure Access Control System (ACS), especially in environments where the system is still deployed or reachable from trusted internal networks.

Technical summary

The supplied official sources describe CVE-2018-0147 as a Java deserialization vulnerability in Cisco Secure Access Control System (ACS). CISA's KEV catalog marks the issue as known exploited and instructs organizations to apply updates per vendor instructions. The provided corpus does not include a Cisco advisory, affected-version list, or further exploit details, so this debrief is limited to the official metadata and remediation guidance supplied.

Defensive priority

High. CISA added this CVE to the KEV catalog on 2022-03-25 and set a remediation due date of 2022-04-15, indicating urgent attention for any exposed Cisco ACS deployment.

Recommended defensive actions

  • Inventory all Cisco Secure Access Control System (ACS) instances and confirm whether they are still in use.
  • Apply vendor updates or mitigations as directed by Cisco and CISA KEV guidance.
  • If ACS is no longer required, decommission it or isolate it from production and administrative access.
  • Restrict network exposure to management interfaces and review any unnecessary inbound access paths.
  • Verify remediation after patching or mitigation and document the affected assets in your vulnerability management records.

Evidence notes

Evidence is limited to the official CVE record, NVD detail page, and CISA KEV metadata supplied in the corpus. The KEV record identifies Cisco Secure Access Control System (ACS), classifies the issue as a Java deserialization vulnerability, marks it as known exploited, and instructs organizations to apply updates per vendor instructions. No additional vendor advisory text, exploit mechanics, or affected-version data were provided.

Official resources

Public debrief based only on official CVE/NVD references and CISA's Known Exploited Vulnerabilities catalog; no exploit code, weaponized reproduction, or unsupported details included.