Privilege escalation in Elastic Services Controller - CVE-2018-0121

 

Privilege escalation in Elastic Services Controller - CVE-2018-0121

Published: February 22, 2018 / Updated: February 26, 2018


Vulnerability identifier: #VU10696
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0121
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Elastic Services Controller

Detailed vulnerability description

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists in the authentication functionality of the web-based service portal of Cisco Elastic Services Controller Software due to improper security restrictions that are imposed by the web-based service portal. A remote attacker can submit an empty password value to an affected portal when prompted to enter an administrative password for the portal, bypass authentication and gain administrator privileges for the web-based service portal.

How to mitigate CVE-2018-0121

Update to version 3.1(0.116).

Sources