SB2018051713 - Multiple vulnerabilities in Cisco Enterprise NFV Infrastructure Software



SB2018051713 - Multiple vulnerabilities in Cisco Enterprise NFV Infrastructure Software

Published: May 17, 2018

Security Bulletin ID SB2018051713
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Path traversal (CVE-ID: CVE-2018-0323)

The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information on the target system.

The weakness exists in the web management interface due to insufficient validation of web request parameters. A remote attacker who has access to the web management interface can send a specially crafted web request, trigger path traversal and gain access to potentially sensitive information.


2) Command injection (CVE-ID: CVE-2018-0324)

The vulnerability allows a local authenticated attacker to execute arbitrary commands on the target system.

The weakness exists in the CLI parser due to insufficient input validation of command parameters. A local attacker can invoke a vulnerable CLI command with specially crafted parameters and execute arbitrary commands with a non-root user account on the underlying Linux operating system.


3) Improper input validation (CVE-ID: CVE-2018-0279)

The vulnerability allows a remote authenticated attacker to execute arbitrary commands on the target system.

The weakness exists in the Secure Copy Protocol (SCP) server due to improper input validation of command arguments. A rmote attacker can use specially crafted arguments when opening a connection to the target device and gain shell access with a non-root user account to the underlying Linux operating system.

Remediation

Install update from vendor's website.