—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
Cisco Security Advisory: Cisco Elastic Services Controller Service Portal Unauthorized Access Vulnerability
Advisory ID: cisco-sa-20180221-esc1
Revision: 1.0
For Public Release: 2018 February 21 16:00 GMT
Last Updated: 2018 February 21 16:00 GMT
CVE ID(s): CVE-2018-0130
CVSS Score v(3): 7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
+———————————————————————
Summary
=======
A vulnerability in the use of JSON web tokens by the web-based service portal of Cisco Elastic Services Controller Software could allow an unauthenticated, remote attacker to gain administrative access to an affected system.
The vulnerability is due to the presence of static default credentials for the web-based service portal of the affected software. An attacker could exploit this vulnerability by extracting the credentials from an image of the affected software and using those credentials to generate a valid administrative session token for the web-based service portal of any other installation of the affected software. A successful exploit could allow the attacker to gain administrative access to the web-based service portal of an affected system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc1 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc1”]
—–BEGIN PGP SIGNATURE—–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=jaoH
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com