CERT-In Vulnerability Note
CIVN-2018-0218
Multiple Vulnerabilities in Cisco
Original Issue Date:December 20, 2018
Severity Rating: HIGH
Software Affected
- Cisco WLC devices
- Cisco 1540 Aironet Series Outdoor Access Points
- Cisco 1800i Aironet Access Points
- Cisco 1810 Aironet Access Points
- Cisco 1815i Aironet Access Points
- Cisco 1815m Aironet Access Points
- Cisco 1815w Aironet Access Points
- Cisco 4800 Aironet Access Points
- Meraki MR30H AP
- Meraki MR33 AP
- Meraki MR42E AP
- Meraki MR53E AP
- Meraki MR74
- Cisco Prime License Manager Releases 11.0.1 and later
Overview
Vulnerabilities have been reported in the Cisco Aironet, Cisco Prime License Manager which could allow the remote attacker to cause Denial of service on the target system, execute arbitrary SQL queries.
Description
1. Texas Instruments Bluetooth Low Energy Denial of Service and Remote Code Execution Vulnerability
(
CVE-2018-16986
)
A vulnerability exists in the Bluetooth Low Energy (BLE) Stack on Texas Instruments (TI) chips CC2640 and CC2650 due to a memory corruption condition that may occur when processing malformed BLE frames. An attacker could exploit this vulnerability by broadcasting malformed BLE frames. Successful exploitation of this vulnerability could allow the attacker to gain the ability to execute arbitrary code or cause a denial of service condition on an affected device.
2. Cisco Prime License Manager SQL Injection Vulnerability
(
CVE-2018-15441
)
A vulnerability exists in the web framework code of Cisco Prime License Manager (PLM) due to lack of proper validation of user-supplied input in SQL queries. An attacker could exploit this vulnerability by sending crafted HTTP POST requests that contain malicious SQL statements to an affected application. Successful exploitation of this vulnerability could allow the attacker to modify and delete arbitrary data in the PLM database or gain shell access with the privileges of the postgres user.
Solution
Apply appropriate updates as mentioned
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181101-ap
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-inject
Vendor Information
CISCO
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181101-ap
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-inject
References
CISCO
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181101-ap
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181128-plm-sql-inject
Security Tracker
https://securitytracker.com/id/1042018
CVE Name
CVE-2018-16986
CVE-2018-15441
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|