Executive Summary

Summary
Title Cisco Elastic Services Controller Service Portal Unauthorized Access Vulnerability
Informations
Name cisco-sa-20180221-esc1 First vendor Publication 2018-02-21
Vendor Cisco Last vendor Modification 2018-02-21
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in the use of JSON web tokens by the web-based service portal of Cisco Elastic Services Controller Software could allow an unauthenticated, remote attacker to gain administrative access to an affected system.

The vulnerability is due to the presence of static default credentials for the web-based service portal of the affected software. An attacker could exploit this vulnerability by extracting the credentials from an image of the affected software and using those credentials to generate a valid administrative session token for the web-based service portal of any other installation of the affected software. A successful exploit could allow the attacker to gain administrative access to the web-based service portal of an affected system.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc1 ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc1"]

BEGIN PGP SIGNATURE

iQJ5BAEBAgBjBQJajZloXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczMUQP/3IAjJNuy4rMeYb2MAcSArsPYkoq x4ATka+VX9/1UOYTY3Odu2sI1rhqMsvGpD0itlEFUi52DM+TJRRTGZc8coODqWXC sVfBdmgyyMWGxIY2ic1t76cnKcQlczHoMUdq2WJR1RveYEdwYOKeCHSl8T8nTDM9 sWZSMi+b5e3cTVf0lic+FwQN3NusoqSRpO9q4Gg+2FtXp6aiLfJdTuGCv60L41FQ 5PoP0SyjE7f/4d0tjObVvgToJ0/a/BE5onxs42Pohn4sCbgZB6ZJtGx0DkNEP1DH 0iPGFrPV5iOvjK9HsX1ITnHpyWiCWFylzYthFv83/0qix4+A0eZ2N4ILHvlzUdHp TO6PSJ+OzrhfDlNpit1Nvi/X+Z3nNcZv8CywjNfmybEUFJeeQuIjEtdPMgWHGKtI iJRa4ODBDeJPFMZnDErL83C4vSIWTbQJWQu5yF05bhvLfUu/2SIiZ4+hMkVXN4ZK ZGMssGOOs8h0CDUqwTwULc79VebQvlG7Z05XUNLH631ZtWCoTuO2tALoU4Z+dwa/ g6gP9cBIKWrYT8l5SYNjNCcUMvO21B621H6A/abekcucbJAkQXFMIVyLD+j4vVCt iGvpPNrpiJ7ZnjP0tlIwqbZj0/7OBAHgzrtWvIfqCufJheufLN9GqMswwBJ7GHYn bNx79IfzvlSLjfcR =jaoH END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2018-03-19 21:21:40
  • Multiple Updates
2018-02-22 05:20:39
  • Multiple Updates
2018-02-21 21:19:43
  • First insertion