Cisco releases the security updates to fix RCE flaws in multiple products
On March 7, Cisco has released several updates to address vulnerabilities affecting Cisco Prime Collaboration Provisioning, Cisco Secure Access Control System and Cisco Web Security Appliance products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
- Cisco Prime Collaboration Provisioning Hard-Coded Password Vulnerability
A vulnerability in Cisco Prime Collaboration Provisioning (PCP) Software could allow an unauthenticated, local attacker to log in to the underlying Linux operating system.
The vulnerability is due to a hard-coded account password on the system. An attacker could exploit this vulnerability by connecting to the affected system via Secure Shell (SSH) using the hard-coded credentials. A successful exploit could allow the attacker to access the underlying operating system as a low-privileged user. After low-level privileges are gained, the attacker could elevate to root privileges and take full control of the device.
Affected products
Cisco Prime Collaboration Provisioning (PCP) Software Release 11.6Solutions
Download the patch here
- Cisco Secure Access Control System Java Deserialization Vulnerability
A vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device.The vulnerability is due to insecure deserialization of user-supplied content by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object. An exploit could allow the attacker to execute arbitrary commands on the device with root privileges.
Affected products
all releases of Cisco Secure ACS prior to release 5.8 patch 9Solutions
Download the patch here - Cisco Web Security Appliance FTP Authentication Bypass Vulnerability
A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username.
The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password.
Affected products
Cisco AsyncOS 10.5.1 for WSA Software
Solutions
Download the patch here