Thursday, March 8, 2018

Hardcoded Password Found in Cisco Software


Hardcoded Password Found in Cisco Software

Cisco released 22 security advisories on 07-March-2018, including two alerts for critical fixes, one of them for a hardcoded password that can give attackers full control over a vulnerable system.

The hardcoded password issue affects Cisco's Prime Collaboration Provisioning (PCP), a software application that can be used for the remote installation and maintenance of other Cisco voice and video products. Cisco PCP is often installed on Linux servers.
Cisco says that an attacker could exploit this vulnerability (CVE-2018-0141) by connecting to the affected system via Secure Shell (SSH) using the hardcoded password.

Hardcoded Password Found in Cisco Software

Flaw considered critical despite "local" attack vector

The flaw can be exploited only by local attackers, and it also grants access to a low-privileged user account. In spite of this, Cisco has classified the issue as "critical."
Although this vulnerability has a Common Vulnerability Scoring System (CVSS) Base score of 5.9, which is normally assigned a Security Impact Rating (SIR) of Medium, there are extenuating circumstances that allow an attacker to elevate privileges to root. For these reasons, the SIR has been set to Critical.
The reasons are that an attacker can infect another device on the same network and use it as a proxy for his SSH connection to the vulnerable Cisco PCP instance, allowing for remote, over-the-Internet exploitation.
Furthermore, there is a large number of elevation-of-privilege exploits affecting the Linux operating system that an attacker can use and gain root access. Hence, Cisco's decision to classify this flaw as "critical" even with a CVSS score of 5.9 out of a maximum of 10.
Cisco says there are no temporary mitigations and workarounds that network admins can deploy to prevent exploitation of older PCP software, and the company has released patches that PCP owners need to install as soon as possible.

Second critical flaw: Java deserialization issue in Cisco ACS

The second critical-level vulnerability that Cisco fixed in yesterday's 22-advisory patch bonanza is a Java deserialization issue affecting Cisco's Secure Access Control System (ACS), a now-deprecated firewall system.
This is a typical Java deserialization issue. When Cisco ACS tries to deserialize user-supplied (Java serialized) content, an attacker could execute code on the device without needing to provide proper credentials. The malicious code runs as root.
This flaw is tracked as CVE-2018-0147, and Cisco has released software updates to address the bug. Information on the other 22 Cisco security advisories can be found on Cisco's security portal.

 
Cisco_Security_Advisories_and_Alerts

Reference

https://tools.cisco.com/security/center/publicationListing.x  

Share:

1 comment:

Popular Posts