SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   Cisco Identity Services Engine Vendors:   Cisco
Cisco Identity Services Engine Lets Remote Users Download Data and Remote Authenticated Users Execute Arbitrary Commands
SecurityTracker Alert ID:  1029236
SecurityTracker URL:  http://securitytracker.com/id/1029236
CVE Reference:   CVE-2013-5530, CVE-2013-5531   (Links to External Site)
Date:  Oct 23 2013
Impact:   Disclosure of system information, Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Two vulnerabilities were reported in Cisco Identity Services Engine. A remote authenticated user can execute arbitrary commands on the target system. A remote user can obtain potentially sensitive information.

A remote authenticated user can connect to the management interface on TCP port 443 and execute arbitrary operating system commands with root privileges [CVE-2013-5530]. The vendor has assigned bug ID CSCuh81511 to this vulnerability. Jan Kadijk from Warpnet (via US-CERT) and Stephen Hosom reported this vulnerability.

A remote user can send a specially crafted request to bypass authentication and download a full product support bundle [CVE-2013-5531]. The vendor has assigned bug ID CSCty20405 to this vulnerability.

Impact:   A remote authenticated user can execute arbitrary commands on the target system with root privileges.

A remote user can download a full product support bundle.

Solution:   The vendor has issued a fix (1.1.1.268-7, 1.1.2.145-10, 1.1.3.124-7, 1.1.4.218-7, 1.2.0.899-2).

The vendor's advisory is available at:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-ise

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-ise (Links to External Site)
Cause:   Access control error, Input validation error

Message History:   None.


 Source Message Contents

Subject:  Cisco Security Advisory: Multiple Vulnerabilities in Cisco Identity Services Engine

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Multiple Vulnerabilities in Cisco Identity Services Engine

Advisory ID: cisco-sa-20131023-ise

Revision 1.0

For Public Release 2013 October 23 16:00  UTC (GMT)
======================================================================

Summary
- -------

Cisco Identity Services Engine (ISE) contains the following vulnerabilities:

	Cisco ISE Authenticated Arbitrary Command Execution Vulnerability
	Cisco ISE Support Information Download Authentication Bypass Vulnerability

These vulnerabilities are independent of each other; a release that is affected by one of the vulnerabilities may not be affected by the other.

Successful exploitation of Cisco ISE Authenticated Arbitrary Command Execution Vulnerability may allow an authenticated remote attacker to execute arbitrary code on the underlying operating system.
Successful exploitation of Cisco ISE Support Information Download Authentication Bypass Vulnerability could allow an attacker to obtain sensitive information including administrative credentials.

Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are not available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-ise

Note: Cisco ISE Software is also affected by the Apache Struts Command Execution Vulnerability described in a separate Cisco Security Advisory available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2

Cisco ISE customers should consult that advisory before making decision on the upgrade path.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org

iF4EAREIAAYFAlJn58YACgkQUddfH3/BbTrONAD9H9SWav6ti4+8q/Ps58twqJ7m
gkTHHTe6/MdgE1K62ZIA/2+7TGX4/3liKP6YSwZsyUVMB0YN5UmnTNwRR8OL06aX
=iYhW
-----END PGP SIGNATURE-----
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC