SB2018100310 - Multiple vulnerabilities in in Cisco Prime Infrastructure



SB2018100310 - Multiple vulnerabilities in in Cisco Prime Infrastructure

Published: October 3, 2018 Updated: October 9, 2018

Security Bulletin ID SB2018100310
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Command injection (CVE-ID: CVE-2018-15379)

The vulnerability allows a remote unauthenticated attacker to execute arbitrary command on the target system.

The weakness exists in the HTTP web server for Cisco Prime Infrastructure (PI) due to incorrect permission setting for important system directories. A remote attacker can upload a malicious file by using TFTP, which can be accessed via the web-interface GUI, run arbitrary commands at the privilege level of the user prime and without authentication.


2) Command injection (CVE-ID: N/A)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists in the HTTP web server for Cisco Prime Infrastructure (PI) due to command injection. A local attacker can bypass execution restrictions in a SUID binary and execute arbitrary commands to gain elevated privileges.


3) Information disclosure (CVE-ID: CVE-2018-15432)

The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.

The vulnerability exists due to the transmission of sensitive information as part of a GET request. A remote attacker can send a specially crafted GET request to a vulnerable device and view sensitive information.


4) Information disclosure (CVE-ID: CVE-2018-15433)

The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.

The vulnerability exists due to the transmission of sensitive information as part of a GET request. A remote attacker can send a specially crafted GET request to a vulnerable device and view sensitive information.


Remediation

Install update from vendor's website.