Cisco Issues Patches for 4 Critical Vulnerabilities in Cisco Policy Suite

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

Cisco’s Policy Suite for Mobile controls billing and access control for customer devices. Root access to this suite is concerning because of the breadth of user device access.

The latest batch of Cisco patches includes fixes for four critical vulnerabilities related to unauthenticated access and default credentials in the Cisco Policy Suite for the Cisco Mobility Services Engine. All four were discovered by internal security testing. In addition, nine high-severity vulnerabilities and 12 medium ones were patched in a variety of other Cisco platforms.

Analysis

Two of the vulnerabilities (CVE-2018-0376 and CVE-2018-0374) give unauthenticated access to the Policy Builder database and interface, respectively, allowing for unauthorized changes to take place. CVE-2018-0377 affects the Open Systems Gateway initiative (OSGi) interface of the Policy Builder Suite and allows the remote attacker to access or change any files that are accessible by the OSGi process. The last critical patch (CVE-2018-0375) involves default credentials in the Cluster Manager of the Suite giving the attacker remote root access.

These Cisco vulnerabilities received a CVSS v3.0 score of 9.8 out of 10, indicating a “critical” degree of severity.

Cisco’s Policy Suite for Mobile controls billing and access control for customer devices. According to Cisco’s configuration documentation, the policy suite controls mobile user configuration and active session tracking. Root access to this suite is concerning because of the breadth of user device access.

Below is a visualization of the scope of mobile elements that this software interacts with.

The latest batch of Cisco patches includes fixes for four critical vulnerabilities related to unauthenticated access and default credentials in the Cisco Policy Suite for the Cisco Mobility Services Engine.

(Source: Cisco)

Solution

The OSGi interface unauthenticated access vulnerability (CVE-2018-0377) affects Cisco Policy Suite releases prior to Release 18.1.0 and is fixed in Cisco Policy Suite Release 18.1.0.

The Cisco Policy Suite Policy Builder Unauthenticated Access Vulnerability (CVE-2018-0376), Cisco Policy Suite Policy Builder Database Unauthenticated Access Vulnerability (CVE-2018-0374) and Cisco Policy Suite Cluster Manager Default Password Vulnerability (CVE-2018-0375) affect releases prior to 18.2.0 and are fixed in Cisco Policy Suite Release 18.2.0. CVE-2018-0375 contains a workaround script (change_passwd.sh) that can be used to update the existing default password.

Additional Information

Critical Cisco Security Advisories:

Learn more about Tenable.io,® the first Cyber Exposure platform for holistic management of your modern attack surface. Get a free 60-day trial of Tenable.io Vulnerability Management.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
1590 Followers
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at tenable.com.
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel