SB2018051713 - Multiple vulnerabilities in Cisco Enterprise NFV Infrastructure Software
Published: May 17, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Path traversal (CVE-ID: CVE-2018-0323)
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information on the target system.
The weakness exists in the web management interface due to insufficient validation of web request parameters. A remote attacker who has access to the web management interface can send a specially crafted web request, trigger path traversal and gain access to potentially sensitive information.
2) Command injection (CVE-ID: CVE-2018-0324)
The vulnerability allows a local authenticated attacker to execute arbitrary commands on the target system.
The weakness exists in the CLI parser due to insufficient input validation of command parameters. A local attacker can invoke a vulnerable CLI command with specially crafted parameters and execute arbitrary commands with a non-root user account on the underlying Linux operating system.
3) Improper input validation (CVE-ID: CVE-2018-0279)
The vulnerability allows a remote authenticated attacker to execute arbitrary commands on the target system.The weakness exists in the Secure Copy Protocol (SCP) server due to improper input validation of command arguments. A rmote attacker can use specially crafted arguments when opening a connection to the target device and gain shell access with a non-root user account to the underlying Linux operating system.
Remediation
Install update from vendor's website.
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-nfvis-path-t...
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-nfvis-cli-co...
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-nfvis