Executive Summary
Summary | |
---|---|
Title | Cisco Elastic Services Controller Service Portal Unauthorized Access Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20180221-esc1 | First vendor Publication | 2018-02-21 |
Vendor | Cisco | Last vendor Modification | 2018-02-21 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the use of JSON web tokens by the web-based service portal of Cisco Elastic Services Controller Software could allow an unauthenticated, remote attacker to gain administrative access to an affected system. The vulnerability is due to the presence of static default credentials for the web-based service portal of the affected software. An attacker could exploit this vulnerability by extracting the credentials from an image of the affected software and using those credentials to generate a valid administrative session token for the web-based service portal of any other installation of the affected software. A successful exploit could allow the attacker to gain administrative access to the web-based service portal of an affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc1 ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc1"] BEGIN PGP SIGNATURE iQJ5BAEBAgBjBQJajZloXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczMUQP/3IAjJNuy4rMeYb2MAcSArsPYkoq x4ATka+VX9/1UOYTY3Odu2sI1rhqMsvGpD0itlEFUi52DM+TJRRTGZc8coODqWXC sVfBdmgyyMWGxIY2ic1t76cnKcQlczHoMUdq2WJR1RveYEdwYOKeCHSl8T8nTDM9 sWZSMi+b5e3cTVf0lic+FwQN3NusoqSRpO9q4Gg+2FtXp6aiLfJdTuGCv60L41FQ 5PoP0SyjE7f/4d0tjObVvgToJ0/a/BE5onxs42Pohn4sCbgZB6ZJtGx0DkNEP1DH 0iPGFrPV5iOvjK9HsX1ITnHpyWiCWFylzYthFv83/0qix4+A0eZ2N4ILHvlzUdHp TO6PSJ+OzrhfDlNpit1Nvi/X+Z3nNcZv8CywjNfmybEUFJeeQuIjEtdPMgWHGKtI iJRa4ODBDeJPFMZnDErL83C4vSIWTbQJWQu5yF05bhvLfUu/2SIiZ4+hMkVXN4ZK ZGMssGOOs8h0CDUqwTwULc79VebQvlG7Z05XUNLH631ZtWCoTuO2tALoU4Z+dwa/ g6gP9cBIKWrYT8l5SYNjNCcUMvO21B621H6A/abekcucbJAkQXFMIVyLD+j4vVCt iGvpPNrpiJ7ZnjP0tlIwqbZj0/7OBAHgzrtWvIfqCufJheufLN9GqMswwBJ7GHYn bNx79IfzvlSLjfcR =jaoH END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Alert History
Date | Informations |
---|---|
2018-03-19 21:21:40 |
|
2018-02-22 05:20:39 |
|
2018-02-21 21:19:43 |
|