Vulnerability identifier: #VU16901
Vulnerability risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Policy Suite
Client/Desktop applications /
File managers, FTP clients
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists in the Graphite web interface of the Policy and Charging Rules Function (PCRF) due to lack of authentication. A remote attacker with access to the internal VLAN where CPS is deployed can directly connect to the Graphite web interface and access various statistics and Key Performance Indicators (KPIs) regarding the Cisco Policy Suite environment.
Mitigation
Update to version 18.5.0.
Vulnerable software versions
Policy Suite: 12.0.0
External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-cps-graphite...
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.