You are here
Home > Preporuke > Ranjivost Cisco Elastic Services Controller softvera

Ranjivost Cisco Elastic Services Controller softvera

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Elastic Services Controller Service Portal Unauthorized Access Vulnerability

Advisory ID: cisco-sa-20180221-esc1

Revision: 1.0

For Public Release: 2018 February 21 16:00 GMT

Last Updated: 2018 February 21 16:00 GMT

CVE ID(s): CVE-2018-0130

CVSS Score v(3): 7.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

+———————————————————————

Summary
=======
A vulnerability in the use of JSON web tokens by the web-based service portal of Cisco Elastic Services Controller Software could allow an unauthenticated, remote attacker to gain administrative access to an affected system.

The vulnerability is due to the presence of static default credentials for the web-based service portal of the affected software. An attacker could exploit this vulnerability by extracting the credentials from an image of the affected software and using those credentials to generate a valid administrative session token for the web-based service portal of any other installation of the affected software. A successful exploit could allow the attacker to gain administrative access to the web-based service portal of an affected system.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc1 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180221-esc1”]

—–BEGIN PGP SIGNATURE—–
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=jaoH
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Ranjivost Cisco UCD upravitelja

Cisco je izdao nadogradnju za otklanjanje ranjivosti u Cisco UCD (Unified Communications Domain) upravitelju. Ranjivost je posljedica nesigurnog generiranja ključeva...

Close