PatchSiren cyber security CVE debrief
CVE-2018-0147 Cisco CVE debrief
CVE-2018-0147 is identified in the supplied official records as a Java deserialization vulnerability affecting Cisco Secure Access Control System (ACS). CISA has added it to the Known Exploited Vulnerabilities catalog, which means it is treated as a known exploitation risk rather than a purely theoretical issue. The KEV entry directs organizations to apply updates per vendor instructions, so any active Cisco ACS deployment should be reviewed promptly for remediation status.
- Vendor
- Cisco
- Product
- Secure Access Control System (ACS)
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2022-03-25
- Original CVE updated
- 2022-03-25
- Advisory published
- 2022-03-25
- Advisory updated
- 2022-03-25
Who should care
Security, IT, and identity/access management teams responsible for Cisco Secure Access Control System (ACS), especially in environments where the system is still deployed or reachable from trusted internal networks.
Technical summary
The supplied official sources describe CVE-2018-0147 as a Java deserialization vulnerability in Cisco Secure Access Control System (ACS). CISA's KEV catalog marks the issue as known exploited and instructs organizations to apply updates per vendor instructions. The provided corpus does not include a Cisco advisory, affected-version list, or further exploit details, so this debrief is limited to the official metadata and remediation guidance supplied.
Defensive priority
High. CISA added this CVE to the KEV catalog on 2022-03-25 and set a remediation due date of 2022-04-15, indicating urgent attention for any exposed Cisco ACS deployment.
Recommended defensive actions
- Inventory all Cisco Secure Access Control System (ACS) instances and confirm whether they are still in use.
- Apply vendor updates or mitigations as directed by Cisco and CISA KEV guidance.
- If ACS is no longer required, decommission it or isolate it from production and administrative access.
- Restrict network exposure to management interfaces and review any unnecessary inbound access paths.
- Verify remediation after patching or mitigation and document the affected assets in your vulnerability management records.
Evidence notes
Evidence is limited to the official CVE record, NVD detail page, and CISA KEV metadata supplied in the corpus. The KEV record identifies Cisco Secure Access Control System (ACS), classifies the issue as a Java deserialization vulnerability, marks it as known exploited, and instructs organizations to apply updates per vendor instructions. No additional vendor advisory text, exploit mechanics, or affected-version data were provided.
Official resources
-
CVE-2018-0147 CVE record
CVE.org
-
CVE-2018-0147 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
Public debrief based only on official CVE/NVD references and CISA's Known Exploited Vulnerabilities catalog; no exploit code, weaponized reproduction, or unsupported details included.