Announcement Announcement Module
Collapse
No announcement yet.
Multiple Vulnerabilities in Cisco Page Title Module
Move Remove Collapse
X
Conversation Detail Module
Collapse
  • Filter
  • Time
  • Show
Clear All
new posts

  • Multiple Vulnerabilities in Cisco

    Multiple Vulnerabilities in Cisco Unified Communications Domain Manager


    Severity Rating: High

    Systems Affected

    • Cisco Unified Communication Domain Manager Versions 4.4
    • Cisco Unified Communication Domain Manager Versions 8.1.1
    • Cisco Unified Communication Domain Manager Versions 8.1.2
    • Cisco Unified Communication Domain Manager Versions 8.1.3
    • Cisco Unified Communication Domain Manager Versions 8.1.4

    Overview

    Multiple vulnerabilities have been reported in Cisco Unified Communication Domain Manager which could allow an unauthenticated remote attacker to escalate privilege escalation on targeted system to gain root access and access and modify BVSMWeb portal user information.

    Description

    1. Cisco Unified Communications Domain Manager Privilege Escalation Vulnerability (CVE-2014-2197)

    This vulnerability is in the web framework of the Cisco Unified Communications Domain Manager Application Software and due to improper implementation of authentication and authorization controls of the Administration GUI. An authenticated remote attacker could exploit this vulnerability by submitting a crafted URL to change the administrative credentials of a user. Successful exploitation of this vulnerability could allow an authenticated remote attacker to elevate a user's administrative access and completely compromise the system.

    2. Cisco Unified Communications Domain Manager Default SSH Key Vulnerability (CVE-2014-2198)

    This vulnerability is in the implementation of the framework that allows access to support representatives of the Cisco Unified Communications Domain Manager Platform Software and due to the presence of a default SSH private key which is stored in an insecure way on the system. An unauthenticated remote attacker could exploit this vulnerability by obtaining the SSH private key. Successful exploitation of this vulnerability could allow an attacker to gain access to the system with the privileges of the root user.

    3. Cisco Unified Communications Domain Manager BVSMWeb Unauthorized Data Manipulation Vulnerability (CVE-2014-3300)

    This vulnerability is in the web framework of Cisco Unified Communications Domain Manager Application Software and due to improper implementation of authentication and authorization controls when accessing some web pages of the BVSMWeb portal. An unauthenticated remote attacker could exploit this vulnerability by submitting a crafted URL to the affected system. Successful exploitation of this vulnerability could allow an attacker to access and modify BVSMWeb portal user information such as Phone directory.

    Solution

    Apply appropriate updates as mentioned in CISCO advisory:
    http://tools.cisco.com/security/cent...20140702-cucdm

    Vendor Information
    CISCO
    http://tools.cisco.com/security/cent...20140702-cucdm

    References
    Cisco
    http://tools.cisco.com/security/cent...?alertId=34790
    http://tools.cisco.com/security/cent...?alertId=34791
    http://tools.cisco.com/security/cent...?alertId=34792

  • #2
    Cisco Wireless Residential Gateway Remote Code Execution Vulnerability

    Severity Rating: High

    Systems Affected
    • Cisco Model DPQ3925 8x4 DOCSIS 3.0 Wireless Residential Gateway with EDVA 5.5.2

    Overview
    A vulnerability have been reported in the web server used in multiple Cisco Wireless Residential Gateway products which could allow an unauthenticated remote attacker to exploit a buffer overflow and could cause arbitrary code execution.

    Description
    This vulnerability is due to incorrect input validation for HTTP requests.
    An attacker could exploit this vulnerability by sending a specially crafted HTTP request to the affected device.
    Successful exploitation of this vulnerability could allow the attacker to crash the web server and execute arbitrary code with elevated privileges on the affected device.

    Solution
    Apply appropriate updates as mentioned in CISCO advisory:
    http://tools.cisco.com/security/cent...sa-20140716-cm

    Vendor Information
    CISCO
    http://tools.cisco.com/security/cent...sa-20140716-cm

    References
    Cisco
    http://tools.cisco.com/security/cent...?alertId=34895

    Comment

    Tag Cloud Tag Cloud Module
    Collapse
    Working...
    X