SB2018030914 - Multiple vulnerabilities in Cisco Identity Services Engine
Published: March 9, 2018 Updated: March 10, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2018-0211)
The vulnerability allows a local attacker with administrative privileges to cause DoS condition on the target system.The weakness exists in specific CLI commands for the Cisco Identity Services Engine due to lack of proper input validation of the CLI user input for certain CLI commands. A local attacker can authenticate to the device and issue a specially crafted, malicious CLI command and cause a DoS condition.
2) Cross-site scripting (CVE-ID: CVE-2018-0212)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists in the web-based management interface due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Privilege escalation (CVE-ID: CVE-2018-0213)
The vulnerability allows a remote authenticated attacker to gain elevated privileges.
The vulnerability exists in the credential reset functionality due to insufficient sanitization of user-supplied data. A remote attacker can authenticate to the device with valid user credentials, send a specially crafted HTTP request and gain elevated privileges to access functionality that should be restricted.
4) Command injection (CVE-ID: CVE-2018-0214)
The vulnerability allows a local attacker to execute arbitrary commands.
The vulnerability exists in certain CLI commands due to insufficient input validation of CLI command user input. A local attacker can authenticate to the targeted device with valid user credentials, issue a CLI command with crafted user input and execute arbitrary commands on the affected system that should be restricted.
5) Cross-site request forgery (CVE-ID: CVE-2018-0215)
The vulnerability allows a remote attacker to perform CSRF attack.The weakness exists in the web-based management interface due to insufficient CSRF protections. A remote attacker can create a specially crafted HTML page or URL, trick the victim into visiting it, gain access to the system and perform arbitrary actions.
6) Cross-site request forgery (CVE-ID: CVE-2018-0216)
The vulnerability allows a remote attacker to perform CSRF attack.The weakness exists in the web-based management interface due to insufficient CSRF protections. A remote attacker can create a specially crafted HTML page or URL, trick the victim into visiting it, gain access to the system and perform arbitrary actions.
7) Command injection (CVE-ID: CVE-2018-0221)
The vulnerability allows a local attacker to execute arbitrary commands.
The vulnerability exists in specific CLI commands due to incomplete input validation of user input for certain CLI ISE configuration commands. A local attacker can authenticate as an administrative user, issue a specific CLI command, enter a specially crafted, malicious user input for the command parameters, perform command injection to the lower-level Linux operating system and cause the ISE user interface for this management session to hang or disconnect.
Remediation
Install update from vendor's website.
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise1
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise2
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise3
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise4
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise5
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180307-ise6