-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.1174 Cisco Umbrella Link and CSV Formula Injection Vulnerabilities 8 April 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco Umbrella Publisher: Cisco Systems Operating System: Cisco Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Provide Misleading Information -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-1475 CVE-2021-1474 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-inject-gbZGHP5T - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco Umbrella Link and CSV Formula Injection Vulnerabilities Priority: Medium Advisory ID: cisco-sa-umbrella-inject-gbZGHP5T First Published: 2021 April 7 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvx27753 CSCvx28555 CVE Names: CVE-2021-1474 CVE-2021-1475 CWEs: CWE-1236 CWE-74 Summary o Multiple vulnerabilities in the Admin audit log export feature and Scheduled Reports feature of Cisco Umbrella could allow an authenticated, remote attacker to perform formula and link injection attacks on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-inject-gbZGHP5T Affected Products o Vulnerable Products These vulnerabilities affect Cisco Umbrella, which is cloud based. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by these vulnerabilities. Details o The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit the other vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerability. Details about the vulnerabilities are as follows. CVE-2021-1474: Cisco Umbrella CSV Formula Injection Vulnerability A vulnerability in the Admin audit log export feature of Cisco Umbrella could allow an authenticated, remote attacker to perform a formula injection attack on an affected device. This vulnerability is due to improper neutralization of formula elements in the comma-separated value (CSV) file that is generated by the Admin audit log export feature. An attacker could exploit this vulnerability by performing certain actions that would lead to an injection of malicious entries into the log. A successful exploit could allow the attacker to inject malicious formula elements into the CSV file. These elements would be executed when a user opens the CSV file with a spreadsheet application, which could lead to manipulation of the data in the CSV file or code execution on the computer of the user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvx27753 CVE ID: CVE-2021-1474 Security Impact Rating (SIR): Medium CVSS Base Score: 6.5 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L CVE-2021-1475: Cisco Umbrella Link Injection Vulnerability A vulnerability in the Scheduled Reports feature of Cisco Umbrella could allow an authenticated, remote attacker to perform a link injection attack on an affected device. This vulnerability is due to improper neutralization of user-supplied input. An attacker could exploit this vulnerability by scheduling a report with a crafted title. A successful exploit could allow the attacker to inject a malicious link into the report, leading the user to believe that the link is coming from the application. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvx28555 CVE ID: CVE-2021-1475 Security Impact Rating (SIR): Medium CVSS Base Score: 4.1 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N Workarounds o There are no workarounds that address these vulnerabilities. Fixed Software o Cisco has addressed these vulnerabilities in Cisco Umbrella, which is cloud based. No user action is required. Customers can determine the current remediation status or software version by using the Help function in the service GUI. Customers who need additional information are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. Source o Cisco would like to thank Abhinav Khanna of eSec Forte Technologies for reporting these vulnerabilities Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-inject-gbZGHP5T Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-APR-07 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYG5ELeNLKJtyKPYoAQhjqg/9Hs9KI+TyKQ802eoUzsCSHgnc6vVLkIES r6PzR/VguZswONK6qiRFQtoFSrCmX/aGQ/LBptiFSRA4HPIyL/8TrSzjGiNoEkq+ N76TaqcOlYCMH3bUutNCpndx0rXUyPI0S1HT8oLVX7qH+yYt0Vb2nKlQYmZeJvR+ Bjt6PehokI+xjhTW89RR0kVs1VZ+yuGo5povmpn7kpDCz/ATH0DOofoaMQxDCzcF YN9wDsAtowOK2GO7zYFdfts5qnTjRzroOGRveLzhKSxOAW7cxWNambC/eiOg6gzR Jizpn1L4axNs4cW6xGhjs0SYhL7B7e4cKdfLLeCeCHxElcY17OPE2fjSv/kjBJc9 jBg91R7yaJIzz0nRylad2wUBq1mATEVoeWAjmRoxDYepKuZl26IdV6//IV4PV4Sr 3KFq7J689dW5NZLFxY+bEtXaSVmotMSZhzZeNjeETCd93xTXWp7ttMX+pvTJSwzB ia0fxregiscMcZ2t3ob7EBY0wpqfgDFVqdGuJGI5SB5YLE9O3rD+a+3iUbAV9wrR K6IErQpR0car5Vf4wDkcuM9NLoavSqDrBtLkw08oXsjDvXg8BtebiFN2aGtZuBrv AXHF8fJ8qEYj63YYXXGStQPikSupeK7F8h0YRKhl9PcOyg+zSWcVoDWCq9WsHnPt ha7bylLtrZs= =mEg+ -----END PGP SIGNATURE-----
The post ESB-2021.1174 – [Cisco] Cisco Umbrella: Multiple vulnerabilities appeared first on Malware Devil.
https://malwaredevil.com/2021/04/08/esb-2021-1174-cisco-cisco-umbrella-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-1174-cisco-cisco-umbrella-multiple-vulnerabilities
No comments:
Post a Comment