#VU16901 Information disclosure in Policy Suite


Published: 2019-01-09 | Updated: 2019-01-10

Vulnerability identifier: #VU16901

Vulnerability risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-15466

CWE-ID: CWE-200

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Policy Suite
Client/Desktop applications / File managers, FTP clients

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists in the Graphite web interface of the Policy and Charging Rules Function (PCRF) due to lack of authentication. A remote attacker with access to the internal VLAN where CPS is deployed can directly connect to the Graphite web interface and access various statistics and Key Performance Indicators (KPIs) regarding the Cisco Policy Suite environment.

Mitigation
Update to version 18.5.0.

Vulnerable software versions

Policy Suite: 12.0.0


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-cps-graphite...


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability