SB2019092528 - Multiple vulnerabilities in Nextcloud ios



SB2019092528 - Multiple vulnerabilities in Nextcloud ios

Published: September 25, 2019 Updated: August 8, 2020

Security Bulletin ID SB2019092528
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Physical access
Highest impact Code execution

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Link following (CVE-ID: CVE-2019-12672)

The vulnerability allows a local non-authenticated attacker to execute arbitrary code.

A vulnerability in the filesystem of Cisco IOS XE Software could allow an authenticated, local attacker with physical access to an affected device to execute arbitrary code on the underlying operating system (OS) with root privileges. The vulnerability is due to insufficient file location validation. An attacker could exploit this vulnerability by placing code in a specific format on a USB device and inserting it into an affected Cisco device. A successful exploit could allow the attacker to execute the code with root privileges on the underlying OS of the affected device.


2) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2019-12649)

The vulnerability allows a local privileged user to execute arbitrary code.

A vulnerability in the Image Verification feature of Cisco IOS XE Software could allow an authenticated, local attacker to install and boot a malicious software image or execute unsigned binaries on an affected device. The vulnerability exists because, under certain circumstances, an affected device can be configured to not verify the digital signatures of system image files during the boot process. An attacker could exploit this vulnerability by abusing a specific feature that is part of the device boot process. A successful exploit could allow the attacker to install and boot a malicious software image or execute unsigned binaries on the targeted device.


Remediation

Install update from vendor's website.