SD-WAN admin? Your number came up in Cisco's latest bug list

Webex, security, IoT systems also need patches

Cisco's irregular patch cycle has come round again and this time the focus is on the company's SD-WAN product.

As well as high-rated bugs in Webex, small business routers and various security products, Switchzilla has disclosed one critical bug in its SD-WAN, and another four vulnerabilities rated high.

That critical rating was assigned to CVE-2019-1651, a bug in the SD-WAN's virtual container, vContainer, the VM which hosts the SD-WAN controllers. If an attacker sends a malicious file to the vContainer, it can cause a buffer overflow, leading to a denial-of-service (DoS) condition that lets the attacker execute arbitrary code as root.

The high-rated bugs in SD-WAN are:

  • CVE-2019-1647, an insecure default configuration that exposes vSmart containers to authenticated, adjacent users;
  • CVE-2019-1648, a user group configuration error that can be exploited to give an authenticated user elevated privileges;
  • CVE-2019-1650, a slip in the command line interface's (CLI's) save command. An authenticated remote attacker can write arbitrary files to the target, escalating their privilege to root; and
  • CVE-2019-1646, also offering privilege escalation via the CLI, but this time only exploitable by an authenticated local attacker.

Webex has two high-rated vulnerabilities: "unsafe search paths used by the application URI" in Windows expose Webex Teams (formerly Spark) to arbitrary remote code execution if a target clicks on a malicious link (CVE-2019-1636); and the Webex Network Recording Player improperly validates recording files (formats ARF and WRF), which also exposes users to remote code execution via phising (here, with multiple CVEs).

Switchzilla's RV320 and RV325 small business routers have a privilege escalation vulnerability in CVE-2019-1652: an attacker with the devices' admin credentials can send malicious HTTP POST commands to the admin interface, and get access as root.

The same boxen also suffer improper access controls for sensitive URLs in CVE-2019-1653. An attacker can connect via HTTP or HTTPS and access URLs that provide router config or diagnostic files.

Cisco this week disclosed two high-rated bugs in security products. Its Identity Services Engine (ISE) is a privilege escalation bug exploitable by an authenticated remote attacker. They can access admin interface pages allowing them to create new Admin accounts, in CVE-2018-15459.

The Firepower Threat Defence's packet inspection can be bypassed, in CVE-2019-1669. Cisco said "specific traffic patterns" could be sent to the device, causing either a "fail open" (it stops inspecting traffic), or a "fail closed" (DoS).

The final vulnerability rated high is in Cisco's IoT Field Director, a network management system for Internet of Things "field area networks". In CVE-2019-1644, a target can be hosed by high rates of UDP packets. ®

Sponsored: Becoming a Pragmatic Security Leader




Biting the hand that feeds IT © 1998–2019