You are here
Home > Preporuke > Ranjivost Cisco Digital Network Architecture Center programskog paketa

Ranjivost Cisco Digital Network Architecture Center programskog paketa

  • Detalji os-a: WN7
  • Važnost: URG
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Digital Network Architecture Center Unauthorized Access Vulnerability

Advisory ID: cisco-sa-20180516-dna

Revision: 1.0

For Public Release: 2018 May 16 16:00 GMT

Last Updated: 2018 May 16 16:00 GMT

CVE ID(s): CVE-2018-0268

CVSS Score v(3): 10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

+———————————————————————

Summary

=======

A vulnerability in the container management subsystem of Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and gain elevated privileges.

This vulnerability is due to an insecure default configuration of the Kubernetes container management subsystem within DNA Center. An attacker who has the ability to access the Kubernetes service port could execute commands with elevated privileges within provisioned containers. A successful exploit could result in a complete compromise of affected containers.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dna [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dna”]

—–BEGIN PGP SIGNATURE—–

iQJ5BAEBAgBjBQJa/FiEXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50
IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly
dEBjaXNjby5jb20+AAoJEJa12PPJBfcz7lYP/0qQ9oSH+5wYR5d7TVa1gXfQGevZ
fe6qcEXGbrUXi0QlKMy3/mC/3RXmnNkxntI6oxRsQEIPl+8oUkvXFKR/2kPXcqcv
zA3tEwoCeHCcs7TKyx1GVXvrMvHbFk8x2Zp0JKBf4rs9iwPKyNC8ZOLsgJ/B3Sl0
2UpNWOiTs7jchBgXWMFM3R3+2Fu6N/ARfxynFtfjkk8U5RzvLNpzqAuzH7oV9Ioy
X38vgBCqSgX5yuo6N5zRkjZXWrV8MApNDzZR1VYrzYygG8KlxCMjkzsBb2DlfA4u
wTA8i7wD4vCgRkonMWpcKO//g8Li9EiYB20oEaynf2gggCY1Jz2hxoVYxkNCDYTE
qlMKvzlU9wpXJqq62cpjAcuJCahZi7brVN6jISlwA1RfuwiwLC0MlrsA4vUoZ63D
VLiCrAII4KTgojf4ERQyf/l2X579XfSRU8kcT9sKXwnbRl8KyIPZvgb3Kzb3HaOM
nOv/9CdeY1ZNj/ysHKnxSYcqbz0JmiZyiI1IYrkylP/8tUSECF5tlSmng/HN7xKE
VEeDXqS4uzwuFhhLHQpw3i7X7ohHqNmFklu9Krkyhrl9a1CvhwnsWxYUZxCPhzVh
Qv1JwO5ZvVD4eMRQIQ+qiflvUQoGvIQVNHyto8ZGnWEpkg9K1/EbvvZ2mXUscfZh
ojPZ/gokq+xUrM3W
=54oW
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorPetar Bertok
Cert idNCERT-REF-2018-05-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Ranjivost u Cisco Identity Services Engine (ISE) programskom paketu

Otkrivena je ranjivost u EAP-TLS protokolu za Cisco Identity Services Engine (ISE). Ranjivost je posljedica EAP autentifikacije klijentskog certifikata, a...

Close