Cisco Patches Acute Faults in Digital Network Architecture Platform

May 19, 2018

 

Cisco has announced repairs to deal with weaknesses that might possibly be abused to gain complete control of impacted systems. Three of the weaknesses are ranked dangerous and have been allocated a CVSS V3 ranking of 10 – the highest ranking under the scoring system. A further four weaknesses have been given a ranking of high with CVSS V3 marks of 8.6, 8.1, 7.5 and 6.3.

The three dangerous weaknesses impact Cisco’s Digital Network Architecture (DNA) platform which, if abused, would let a threat attacker sidestep verification steps and attack basic functions of the platform, possibly taking complete control of systems.

CVE-2018-0271 – CVSS V3 10 – is a Digital System Architecture Center authentication sidestep weakness that would let an attacker sidestep verification controls to access crucial facilities, leading to higher freedoms in the DNA Center. The weakness is because of the failure to regularize URLs before repairing appeals.

CVE-2018-0222 – CVSS V3 10 – is a Digital System Architecture Center static identifications weakness that lets an unauthenticated attacker log into DNA facilities with an administrator account that has default as well as static user identifications. The weakness is because of undocumented, static user identifications for the default administrative account for the impacted software.

CVE-2018-0268 – CVSS V3 10 – is a Digital System Architecture Center illegal access weakness that would let a threat actor to fully compromise a Kubernetes container administration subsystem within the DNA center. The weakness is because of an unprotected default structure of the Kubernetes container administration subsystem.

The four other weaknesses, in order of harshness, are:

CVE-2018-0277 – CVSS V3 8.6 – An Identity Facilities Engine EAP TLS Certificate rejection of facility weakness that might let an attacker cause the ISE application server to start again unpredictably, causing a denial of service condition. The weakness is because of partial input authentication of the client EAP-TLS certificate.

CVE-2018-0270 – CVSS V3 8.1 – An IoT Field Network Director cross-site request fake weakness that might be abused distantly to carry out a cross-site request forgery (CSRF) attack letting change of data of present users and groups. The weakness is because of inadequate CSRF safeguards for the web-based administration interface.

CVE-2018-0280 – CVSS V3 7.5 – A Meeting Server Media Services refusal of service weakness that might let an attacker cause a refusal of service condition. The weakness is because of inadequate input authentication of incoming RTP bitstreams.

CVE-2018-0279 – CVSS V3 6.3 – A weakness impacting the Secure Copy Protocol (SCP) server of Cisco Enterprise NFV Infrastructure Software (NFVIS) triggered by inappropriate input authentication of command arguments. If abused, a distant attacker might access the shell of the Linux operating system on the impacted appliance.

Cisco notices that there are no workarounds for any of the seven weaknesses, which can only be remediated by applying the correct patches.

The National Cybersecurity and Communications Integration Center (NCCIC) is encouraging users of the impacted Cisco software and solutions to apply the proper patches as soon as possible to avoid misuse of the weaknesses.