CERT-In Vulnerability Note
CIVN-2016-0307
Multiple Vulnerabilities in Cisco
Original Issue Date:December 13, 2016
Severity Rating: MEDIUM
Systems Affected
- Cisco IOx subsystem of Cisco IOS and Cisco XE software
- Cisco IOS XR Software
Overview
Multiple vulnerabilities have been reported in Cisco which could be exploited by an unauthenticated remote attacker to cause the device to execute arbitrary commands, and cause denial of service (DoS) condition on the targeted device.
Description
1. Cisco IOx Application-Hosting Framework Directory Traversal Vulnerability
(
CVE-2016-9199
)
This vulnerability is due to insufficient input validation by the affected framework which could be exploited by a remote attacker by sending specially crafted data to the target Cisco Application-hosting Framework (CAF) of Cisco IOx to read arbitrary files on the target device. Successful exploitation of these vulnerabilities could allow a remote attacker to read arbitrary files on the target device.
2. Cisco IOS XR Software Default Credentials Vulnerability
(
CVE-2016-9215
)
This vulnerability is due to a user account that has a default and static password which could be exploited by remote attackers by connecting the affected device using default account or with default credentials and allowing the attacker to gain complete control of the targeted device with root user privileges. Successful exploitation of this vulnerability could allow a remote attacker to gain complete control of the targeted device with root user privileges.
3. Cisco IOS and IOS XE Software SSH X.509 Authentication Bypass Vulnerability
(
CVE-2016-6474
)
This vulnerability is due to improper validation of X.509 signatures during the SSH authentication phase which could be exploited by remote attackers by a certificate signature validation flaw in the X.509v3 SSH authentication function to bypass authentication and access the target users account via SSH connection on the targeted device. Successful exploitation of this vulnerability could allow a remote attacker to bypass authentication on an affected device.
Solution
Apply appropriate updates as mentioned in CISCO advisory:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-caf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-iosxr
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios-xe-x509
Vendor Information
CISCO
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-caf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-iosxr
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios-xe-x509
References
CISCO
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-caf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-iosxr
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-ios-xe-x509
CVE Name
CVE-2016-9199
CVE-2016-9215
CVE-2016-6474
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|