Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog Tenable

S'abonner

Des vulnérabilités Cisco critiques sur plusieurs produits, publication présumée d'un code d'exploit pour CVE-2019-1913

Cisco published new advisories for Integrated Management Controller (IMC) and Unified Computing System (UCS) Director, and updates for Small Business 220 Series Smart Switches that include the existence of public exploit code. 

Contexte

On August 21, Cisco published 27 new advisories and updated six advisories across a variety of its products.

Analyse

Twelve of the advisories address vulnerabilities in Cisco Integrated Management Controller (IMC) used to manage Cisco Unified Computing System (UCS) C-Series Rack Servers and S-Series Storage Servers. Six advisories are for vulnerabilities affecting Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data. Four of the six advisories are rated by Cisco as Critical.

CVEProduitsImpact Type CVSSv3 (Vendor) Sévérité
CVE-2019-1938Cisco UCS Director and Cisco UCS Director Express for Big Data APIAuthentication BypassUnauthenticated9.8Critique
CVE-2019-1935Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big DataUser Default CredentialsUnauthenticated9.8Critique
CVE-2019-1937Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big DataAuthentication BypassUnauthenticated9.8Critique
CVE-2019-1974Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big DataAuthentication BypassUnauthenticated9.8Critique
CVE-2019-12634Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big DataCommand InjectionUnauthenticated8.6Élevée
CVE-2019-1936Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big DataCommand InjectionAuthenticated7.2Élevée

Five of the six vulnerabilities could be exploited by an unauthenticated, remote attacker sending specially crafted requests to a vulnerable system. CVE-2019-1936 can only be exploited by an authenticated, remote attacker who is capable of logging into the vulnerable management interface. However, with CVE-2019-1935, an attacker could exploit this vulnerability by using the ‘scpuser’ account. According to Cisco, this default account has “incorrect permission settings” and uses an “undocumented default password” to log into a vulnerable system. Tenable has not yet confirmed whether use of the scpuser account would allow an attacker to exploit CVE-2019-1936.

Cisco also patched several additional IMC vulnerabilities this month.

CVEImpactCVSSv3 Sévérité
CVE-2019-1907À l'élévation de privilèges8.8Élevée
CVE-2019-1865Command Injection8.8Élevée
CVE-2019-1864Command Injection8.8Élevée
CVE-2019-1900Denial of Service7.5Élevée
CVE-2019-1908Information Disclosure7.5Élevée
CVE-2019-1896Command Injection7.2Élevée
CVE-2019-1885Command Injection7.2Élevée
CVE-2019-1634Command Injection7.2Élevée
CVE-2019-1850Command Injection7.2Élevée
CVE-2019-1871Buffer Overflow7.2Élevée
CVE-2019-1883Command Injection7.0Élevée
CVE-2019-1863À l'élévation de privilèges6.5Élevée

In addition to these new advisories, Cisco released several updates for previously published advisories. This includes updates to the recently reported vulnerabilities in the Cisco Small Business 220 Series Smart Switches from August 6.

CVEImpactCVSSv3Tenable VPR Sévérité
CVE-2019-1913Remote Code Execution9.88.9Critique
CVE-2019-1912Authentication Bypass9.18.3Critique
CVE-2019-1914Command Injection7.28.6Moyen

Two of the three 220 Series Smart Switches vulnerabilities are rated as Critical and exist within the web management interface of these devices. Sending specially crafted requests to the vulnerable interface could allow a remote attacker to execute arbitrary code (CVE-2019-1913) or modify the device configuration (CVE-2019-1912). CVE-2019-1914 requires an attacker to be authenticated on a vulnerable interface and have level 15 permissions.

Additionally, Cisco updated its advisory for CVE-2019-1649, the Secure Boot Hardware Tampering Vulnerability known as Thrangrycat, to account for additional vulnerable products.

Démonstration de faisabilité (PoC)

Cisco’s Product Security Incident Response Team (PSIRT) notes in the updated advisories for the Small Business 220 Series Smart Switches that they are aware of the presence of public exploit code for these devices. However, at the time this blog post was published, Tenable has not identified a proof of concept (PoC) for these vulnerabilities.

Solution

Cisco has released updates for each of the affected products. The affected versions and relevant fixed versions can be found under the advisory pages. Customers should obtain and install these updates as soon as possible.

Identification des systèmes affectés

A list of Tenable plugins to identify these vulnerabilities will appear here as they’re released.

Get more information 

Rejoignez l'équipe SRT de Tenable sur Tenable Community.

Apprenez-en plus sur Tenable, la première plateforme de Cyber Exposure qui vous permet de gérer votre surface d'attaque moderne de manière globale.

Get a free 60-day trial of Tenable.io Vulnerability Management.

Articles connexes

Des actualités décisives sur la cyber-sécurité

Saisissez votre adresse e-mail et ne manquez plus aucune alerte ni aucun conseil en matière de sécurité de la part de nos experts Tenable.