Malware Devil

Thursday, January 21, 2021

ESB-2021.0248 – [Cisco] Cisco Elastic Services Controller: Denial of service – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0248
     Cisco Elastic Services Controller Denial of Service Vulnerability
                              21 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Elastic Services Controller
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-1312  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esc-dos-4Gw6D527

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Elastic Services Controller Denial of Service Vulnerability

Priority:        Medium
Advisory ID:     cisco-sa-esc-dos-4Gw6D527
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvv69484
CVE Names:       CVE-2021-1312
CWEs:            CWE-400

Summary

  o A vulnerability in the system resource management of Cisco Elastic Services
    Controller (ESC) could allow an unauthenticated, remote attacker to cause a
    denial of service (DoS) to the health monitor API on an affected device.

    The vulnerability is due to inadequate provisioning of kernel parameters
    for the maximum number of TCP connections and SYN backlog. An attacker
    could exploit this vulnerability by sending a flood of crafted TCP packets
    to an affected device. A successful exploit could allow the attacker to
    block TCP listening ports that are used by the health monitor API. This
    vulnerability only affects customers who use the health monitor API.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esc-dos-4Gw6D527

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected Cisco ESC releases
    5.3.0.94 and earlier.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, Cisco ESC releases 5.3.0.102 and later
    contained the fix for this vulnerability.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esc-dos-4Gw6D527

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=c/7l
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0248 – [Cisco] Cisco Elastic Services Controller: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/01/21/esb-2021-0248-cisco-cisco-elastic-services-controller-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0248-cisco-cisco-elastic-services-controller-denial-of-service-remote-unauthenticated

ESB-2021.0249 – [Cisco] Cisco ESA, SMA and WSA products: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0249
     Cisco Email Security Appliance, Cisco Content Security Management
          Appliance, and Cisco Web Security Appliance Information
                         Disclosure Vulnerability
                              21 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Email Security Appliance (ESA)
                   Cisco Content Security Management Appliance (SMA)
                   Cisco Web Security Appliance (WSA)
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
                   Unauthorised Access      -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-1129  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-RHp44vAC

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Email Security Appliance, Cisco Content Security Management Appliance,
and Cisco Web Security Appliance Information Disclosure Vulnerability

Priority:        Medium
Advisory ID:     cisco-sa-esa-wsa-sma-info-RHp44vAC
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvu89555 CSCvu93199 CSCvu93201
CVE Names:       CVE-2021-1129
CWEs:            CWE-201

Summary

  o A vulnerability in the authentication for the general purpose APIs
    implementation of Cisco Email Security Appliance (ESA), Cisco Content
    Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA)
    could allow an unauthenticated, remote attacker to access general system
    information and certain configuration information from an affected device.

    The vulnerability exists because a secure authentication token is not
    required when authenticating to the general purpose API. An attacker could
    exploit this vulnerability by sending a crafted request for information to
    the general purpose API on an affected device. A successful exploit could
    allow the attacker to obtain system and configuration information from the
    affected device, resulting in an unauthorized information disclosure.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-RHp44vAC

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected Cisco ESA, Cisco
    SMA, and Cisco WSA if they supported general purpose API and the release
    was earlier than the first fixed release.

    The general purpose API was first supported in the following Cisco software
    releases:

       ESA Release 13.0
       SMA Release 12.5
       WSA Release 11.8

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Details

  o The general purpose API and the information obtained by this API are
    described in the General Purpose APIs chapter of the AsyncOS 13.0 API for
    Cisco Email Security Appliances Getting Started Guide .

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, the following Cisco software releases contained
    the fix for this vulnerability:

       ESA releases 13.5.2 and later
       SMA releases 13.8.0 and later
       WSA releases 12.5.1 and later

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-wsa-sma-info-RHp44vAC

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=aivf
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0249 – [Cisco] Cisco ESA, SMA and WSA products: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/01/21/esb-2021-0249-cisco-cisco-esa-sma-and-wsa-products-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0249-cisco-cisco-esa-sma-and-wsa-products-multiple-vulnerabilities

ESB-2021.0246 – [Cisco] Cisco Data Center Network Manager: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0246
        Cisco Data Center Network Manager multiple vulnerabilities
                              21 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Data Center Network Manager
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Modify Arbitrary Files          -- Existing Account            
                   Delete Arbitrary Files          -- Existing Account            
                   Cross-site Scripting            -- Remote with User Interaction
                   Access Confidential Data        -- Remote/Unauthenticated      
                   Reduced Security                -- Remote/Unauthenticated      
                   Unauthorised Access             -- Existing Account            
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-1286 CVE-2021-1283 CVE-2021-1277
                   CVE-2021-1276 CVE-2021-1272 CVE-2021-1270
                   CVE-2021-1269 CVE-2021-1255 CVE-2021-1253
                   CVE-2021-1250 CVE-2021-1249 CVE-2021-1248
                   CVE-2021-1247 CVE-2021-1135 CVE-2021-1133
                   CVE-2020-1276  

Reference:         ASB-2020.0107
                   ESB-2020.3874
                   ESB-2020.3402
                   ESB-2020.3063
                   ESB-2020.2532
                   ESB-2020.2009.3
                   ESB-2020.1899

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh

Comment: This bulletin contains seven (7) Cisco Systems security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Data Center Network Manager Authorization Bypass Vulnerabilities

Priority:        Medium
Advisory ID:     cisco-sa-dcnm-authbypass-OHBPbxu
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvu57868 CSCvv87627
CVE Names:       CVE-2021-1269 CVE-2021-1270

Summary

  o Multiple vulnerabilities in the web-based management interface of Cisco
    Data Center Network Manager (DCNM) could allow an authenticated, remote
    attacker to view, modify, and delete data without proper authorization.

    For more information about these vulnerabilities, see the Details section
    of this advisory.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu

Affected Products

  o Vulnerable Products

    At the time of publication, these vulnerabilities affected Cisco DCNM
    releases earlier than Release 11.5(1).

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by these vulnerabilities.

Details

  o The vulnerabilities are not dependent on one another; exploitation of one
    of the vulnerabilities is not required to exploit the other vulnerability.
    In addition, a software release that is affected by one of the
    vulnerabilities may not be affected by the other vulnerability.

    Details about the vulnerabilities are as follows:

    CVE-2021-1270: Cisco DCNM Authorization Bypass Vulnerability

    A vulnerability in the web-based management interface of Cisco DCNM could
    allow an authenticated, remote attacker to modify the configuration without
    proper authorization.

    This vulnerability is due to a failure to limit access to resources that
    are intended for users with Administrator privileges. An attacker could
    exploit this vulnerability by sending a crafted HTTP request to an affected
    device. A successful exploit could allow a low-privileged attacker to edit
    the configuration. To exploit this vulnerability, an attacker would need
    valid nonadministrative credentials.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvv87627
    CVE-ID: CVE-2021-1270
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 7.1
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L

    CVE-2021-1269: Cisco DCNM Authorization Bypass Vulnerability

    A vulnerability in the web-based management interface of Cisco DCNM could
    allow an authenticated, remote attacker to bypass authorization on an
    affected device and access sensitive information that is related to the
    device.

    This vulnerability is due to a failure to limit access to resources that
    are intended for users with Administrator privileges. An attacker could
    exploit this vulnerability by sending a crafted HTTP request to an affected
    device. A successful exploit could allow a low-privileged attacker to list,
    view, create, edit, and delete specific system configurations in the same
    manner as a user with Administrator privileges.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvu57868
    CVE-ID: CVE-2021-1269
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 6.3
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Workarounds

  o There are no workarounds that address these vulnerabilities.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, Cisco DCNM releases 11.5(1) and later contained
    the fix for these vulnerabilities.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerabilities that are
    described in this advisory.

Source

  o These vulnerabilities were found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-authbypass-OHBPbxu

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------------------------------------------------------------

Cisco Data Center Network Manager Certificate Validation Vulnerabilities

Priority:        High
Advisory ID:     cisco-sa-dcnm-cert-check-BdZZV9T3
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvv35346 CSCvv35348 CSCvv35354 CSCvv82441
CVE Names:       CVE-2021-1276 CVE-2021-1277
CWEs:            CWE-295

Summary

  o Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) could
    allow an attacker to spoof a trusted host or construct a man-in-the-middle
    attack to extract sensitive information or alter certain API requests.

    These vulnerabilities are due to insufficient certificate validation when
    establishing HTTPS requests with the affected device.

    For more information about these vulnerabilities, see the Details section
    of this advisory.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3

Affected Products

  o Vulnerable Products

    These vulnerabilities affect Cisco Data Center Network Manager releases
    earlier than 11.5(1).

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by these vulnerabilities.

Details

  o The vulnerabilities are not dependent on one another; exploitation of one
    of the vulnerabilities is not required to exploit the other vulnerability.
    In addition, a software release that is affected by one of the
    vulnerabilities may not be affected by the other vulnerability.

    Details about the vulnerabilities are as follows:

    CVE-2020-1276: Cisco Data Center Network Manager Certificate Validation
    Vulnerability

    A vulnerability in the Device Manager application of Cisco DCNM could allow
    an unauthenticated, remote attacker to modify a specific API request that
    is used to verify a user's authentication token.

    This vulnerability is due to a lack of validation of the SSL certificate
    used when establishing a connection to the Device Manager application. An
    attacker could exploit this vulnerability by sending a crafted HTTP request
    to an affected device. A successful exploit could allow the attacker to
    alter a specific API request.

    Bug ID(s): CSCvv82441
    CVE ID: CVE-2021-1276
    Security Impact Rating (SIR): High
    CVSS Base Score: 7.5
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

    CVE-2021-1277: Cisco Data Center Network Manager Certificate Validation
    Vulnerability

    A vulnerability in Cisco DCNM could allow an unauthenticated, remote
    attacker to spoof a trusted host or construct a man-in-the-middle attack to
    extract sensitive information from the affected device.

    This vulnerability is due to a lack of certificate validation. An attacker
    could exploit this vulnerability by using a crafted X.509 certificate and
    could then intercept communications. A successful exploit could allow the
    attacker to view and alter potentially sensitive information that DCNM
    maintains about clients that are connected to the network.

    Bug ID(s): CSCvv35348 , CSCvv35346 , CSCvv35354
    CVE ID: CVE-2021-1277
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 6.5
    CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N

Workarounds

  o There are no workarounds that address these vulnerabilities.

Fixed Software

  o Cisco has released free software updates that address the vulnerabilities
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
    /en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    Cisco fixed these vulnerabilities in Cisco DCNM releases 11.5(1) and later.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerabilities that are
    described in this advisory.

Source

  o These vulnerabilities were found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-cert-check-BdZZV9T3

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+



- --------------------------------------------------------------------------------

Cisco Data Center Network Manager Information Disclosure Vulnerability

Priority:        Medium
Advisory ID:     cisco-sa-dcnm-info-disc-QCSJB6YG
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvv07941 CSCvv07942 CSCvv07945 CSCvv07947
CVE Names:       CVE-2021-1283
CWEs:            CWE-789

Summary

  o A vulnerability in the logging subsystem of Cisco Data Center Network
    Manager (DCNM) could allow an authenticated, local attacker to view
    sensitive information in a system log file that should be restricted.

    The vulnerability exists because sensitive information is not properly
    masked before it is written to system log files. An attacker could exploit
    this vulnerability by authenticating to an affected device and inspecting a
    specific system log file. A successful exploit could allow the attacker to
    view sensitive information in the system log file. To exploit this
    vulnerability, the attacker would need to have valid user credentials.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG

Affected Products

  o Vulnerable Products

    At the time of publication, this vulnerability affected Cisco DCNM releases
    earlier than Release 11.5(1).

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, Cisco DCNM releases 11.5(1) and later contained
    the fix for this vulnerability.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-info-disc-QCSJB6YG

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+



- --------------------------------------------------------------------------------

Cisco Data Center Network Manager REST API Vulnerabilities

Priority:        Medium
Advisory ID:     cisco-sa-dcnm-api-path-TpTApx2p
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvt82606 CSCvu28383 CSCvu28385
CVE Names:       CVE-2021-1133 CVE-2021-1135 CVE-2021-1255
CWEs:            CWE-184 CWE-20 CWE-807

CVSS Score:
6.5  AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:X/RL:X/RC:X

Summary

  o Multiple vulnerabilities in the REST API endpoint of Cisco Data Center
    Network Manager (DCNM) could allow an authenticated, remote attacker to
    view, modify, and delete data without proper authorization.

    For more information about these vulnerabilities, see the Details section
    of this advisory.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p

Affected Products

  o Vulnerable Products

    At the time of publication, these vulnerabilities affected Cisco DCNM
    releases earlier than Release 11.4(1).

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Details

  o The vulnerabilities are not dependent on one another. Exploitation of one
    of the vulnerabilities is not required to exploit the other
    vulnerabilities. In addition, a software release that is affected by one of
    the vulnerabilities may not be affected by the other vulnerabilities.

    Details about the vulnerabilities are as follows.

    CVE-2021-1133: Cisco Data Center Network Manager Path Traversal
    Vulnerability

    A vulnerability in the REST API of Cisco Data Center Network Manager (DCNM)
    could allow an authenticated, remote attacker with a low-privilege account
    to conduct a path traversal attack on an affected device.

    The vulnerability is due to insufficient validation of user-supplied input
    to the API. An attacker could exploit this vulnerability by sending a
    crafted request to the API. A successful exploit could allow the attacker
    to delete arbitrary files on the file system.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvt82606
    CVE-ID: CVE-2021-1133
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 6.5
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

    CVE-2021-1255: Cisco Data Center Network Manager Path Traversal
    Vulnerability

    A vulnerability in a certain REST API endpoint of Cisco Data Center Network
    Manager (DCNM) could allow an authenticated, remote attacker to perform a
    path traversal attack on an affected device.

    The vulnerability is due to insufficient path restriction enforcement. An
    attacker could exploit this vulnerability by sending crafted HTTP requests
    to an affected device. A successful exploit could allow the attacker to
    overwrite or list arbitrary files on the affected device.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvu28383
    CVE-ID: CVE-2021-1255
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 4.6
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

    CVE-2021-1135: Cisco DCNM Software Configuration Bypass Vulnerability

    A vulnerability in a certain REST API endpoint of Cisco Data Center Network
    Manager could allow an authenticated, remote attacker to bypass security
    controls and modify default server configuration settings on the affected
    device.

    The vulnerability is due to an incorrect comparison in a denylist
    implementation. An attacker could exploit this vulnerability by sending
    specially crafted network traffic to the affected software. A successful
    exploit could allow the attacker to modify server configuration settings on
    the affected device.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvu28385
    CVE-ID: CVE-2021-1135
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 4.3
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Workarounds

  o There are no workarounds that address these vulnerabilities.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, Cisco DCNM releases 11.4(1) and later contained
    the fix for these vulnerabilities.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerabilities that are
    described in this advisory.

Source

  o These vulnerabilities were found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-api-path-TpTApx2p

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+



- --------------------------------------------------------------------------------

Cisco Data Center Network Manager SQL Injection Vulnerabilities

Priority:        High
Advisory ID:     cisco-sa-dcnm-sql-inj-OAQOObP
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvv82432 CSCvv82433
CVE Names:       CVE-2021-1247 CVE-2021-1248
CWEs:            CWE-89

Summary

  o Multiple vulnerabilities in certain REST API endpoints of Cisco Data Center
    Network Manager (DCNM) could allow an authenticated, remote attacker to
    execute arbitrary SQL commands on an affected device.

    For more information about these vulnerabilities, see the Details section
    of this advisory.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP

Affected Products

  o Vulnerable Products

    These vulnerabilities affect Cisco DCNM releases earlier than Release 11.5
    (1).

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by these vulnerabilities.

Details

  o The vulnerabilities are not dependent on one another. Exploitation of one
    of the vulnerabilities is not required to exploit the other vulnerability.
    In addition, a software release that is affected by one of the
    vulnerabilities may not be affected by the other vulnerability.

    Details about the vulnerabilities are as follows.

    CVE-2021-1247: Cisco DCNM SQL Injection Vulnerability

    A vulnerability in a REST API endpoint of Cisco DCNM could allow an
    authenticated, remote attacker with lower-level privileges to execute
    arbitrary SQL commands on an affected device.

    This vulnerability is due to insufficient validation of user-supplied input
    to the API. An attacker with lower-level privileges, such as
    network-operator , could exploit this vulnerability by sending a crafted
    request to the API. A successful exploit could allow the attacker to view
    information that they are not authorized to view, make changes to the
    system that they are not authorized to make, or execute commands within the
    underlying operating system that may affect the availability of the device.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvv82432
    CVE ID: CVE-2021-1247
    Security Impact Rating (SIR): High
    CVSS Base Score: 8.8
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    CVE-2021-1248: Cisco DCNM SQL Injection Vulnerability

    A vulnerability in a REST API endpoint of Cisco DCNM could allow an
    authenticated, remote attacker with administrative privileges to execute
    arbitrary SQL commands on an affected device.

    This vulnerability is due to insufficient validation of user-supplied input
    to the API. An attacker with administrative privileges could exploit this
    vulnerability by sending a crafted request to the API. A successful exploit
    could allow the attacker to view information that they are not authorized
    to view, make changes to the system that they are not authorized to make,
    or execute commands within the underlying operating system that may affect
    the availability of the device.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvv82433
    CVE ID: CVE-2021-1248
    Security Impact Rating (SIR): High
    CVSS Base Score: 7.2
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Workarounds

  o There are no workarounds that address these vulnerabilities.

Fixed Software

  o Cisco has released free software updates that address the vulnerabilities
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
    /en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    Cisco fixed these vulnerabilities in Cisco DCNM releases 11.5(1) and later.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerabilities that are
    described in this advisory.

Source

  o These vulnerabilities were found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-sql-inj-OAQOObP

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+



- --------------------------------------------------------------------------------

Cisco Data Center Network Manager Server-Side Request Forgery Vulnerability

Priority:        High
Advisory ID:     cisco-sa-dcnm-ssrf-F2vX6q5p
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvv82444
CVE Names:       CVE-2021-1272
CWEs:            CWE-918

Summary

  o A vulnerability in the session validation feature of Cisco Data Center
    Network Manager (DCNM) could allow an unauthenticated, remote attacker to
    bypass access controls and conduct a server-side request forgery (SSRF)
    attack on a targeted system.

    This vulnerability is due to insufficient validation of parameters in a
    specific HTTP request by an attacker. An attacker could exploit this
    vulnerability by sending a crafted HTTP request to an authenticated user of
    the DCNM web application. A successful exploit could allow the attacker to
    bypass access controls and gain unauthorized access to the Device Manager
    application, which provides access to network devices managed by the
    system.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p

Affected Products

  o Vulnerable Products

    This vulnerability affects Cisco DCNM Software if it is running a release
    earlier than 11.5(1).

    This vulnerability affects DCNM-Storage Area Network (SAN) deployments ,
    including the following:

       Open Virtual Appliance (OVA) deployments
       Windows DCNM-SAN installations
       Linux DCNM-SAN installations

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
    /en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    Cisco fixed this vulnerability in Cisco DCNM software releases 11.5(1) and
    later.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-ssrf-F2vX6q5p

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+



- --------------------------------------------------------------------------------

Cisco Data Center Network Manager Vulnerabilities

Priority:        Medium
Advisory ID:     cisco-sa-dcnm-xss-vulns-GuUJ39gh
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvu50101 CSCvu68933 CSCvv00638 CSCvv00642 CSCvv00643
                 CSCvv00644 CSCvv00645 CSCvv00646 CSCvv00654 CSCvv07930
                 CSCvv87589 CSCvv87602 CSCvv87608 CSCvv87614
CVE Names:       CVE-2021-1249 CVE-2021-1250 CVE-2021-1253 CVE-2021-1286
CWEs:            CWE-20 CWE-79

Summary

  o Multiple vulnerabilities in the web-based management interface of Cisco
    Data Center Network Manager (DCNM) could allow a remote attacker with
    network-operator privileges to conduct a cross-site scripting (XSS) attack
    or a reflected file download (RFD) attack against a user of the interface.

    For more information about these vulnerabilities, see the Details section
    of this advisory.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh

Affected Products

  o Vulnerable Products

    At the time of publication, these vulnerabilities affected Cisco DCNM
    releases earlier than Release 11.5(1).

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by these vulnerabilities.

Details

  o The vulnerabilities are not dependent on one another. Exploitation of one
    of the vulnerabilities is not required to exploit the other vulnerability.
    In addition, a software release that is affected by one of the
    vulnerabilities may not be affected by the other vulnerability.

    Details about the vulnerabilities are as follows.

    CVE-2021-1249: Cisco DCNM Cross-Site Scripting Vulnerabilities

    Multiple vulnerabilities in the web-based management interface of Cisco
    DCNM could allow an authenticated, remote attacker to conduct an XSS attack
    against a user of the interface.

    These vulnerabilities are due to insufficient input validation by the
    web-based management interface. An attacker could exploit these
    vulnerabilities by inserting malicious data into a specific data field in
    the interface. A successful exploit could allow the attacker to execute
    arbitrary script code in the context of the affected interface or access
    sensitive, browser-based information.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    Bug ID(s): CSCvv00645 , CSCvu50101 , CSCvu49711 , CSCvu68933
    CVE ID: CVE-2021-1249
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 6.5
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L

    CVE-2021-1286: Cisco DCNM Reflected File Download Vulnerabilities

    Multiple vulnerabilities in the web-based management interface of Cisco
    DCNM could allow an unauthenticated, remote attacker to conduct an RFD
    attack against a user of the interface of an affected device.

    These vulnerabilities are due to insufficient validation of user-supplied
    input by the web-based management interface. An attacker could exploit
    these vulnerabilities by persuading an authenticated user of the interface
    to click a link that submits malicious input to the interface. A successful
    exploit could allow the attacker to execute arbitrary script code on the
    affected device.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    Bug ID(s): CSCvv87608 , CSCvv87589 , CSCvv87602
    CVE ID: CVE-2021-1286
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 6.1
    CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N

    CVE-2021-1250: Cisco DCNM Cross-Site Scripting Vulnerabilities

    Multiple vulnerabilities in the web-based management interface of Cisco
    DCNM could allow an authenticated, remote attacker to conduct an XSS attack
    against a user of the interface.

    These vulnerabilities are due to insufficient input validation by the
    web-based management interface. An attacker could exploit these
    vulnerabilities by inserting malicious data into a specific data field in
    the interface. A successful exploit could allow the attacker to execute
    arbitrary script code in the context of the affected interface or access
    sensitive, browser-based information.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    Bug ID(s): CSCvv00642 , CSCvv87614 , CSCvv00638 , CSCvv00644 , CSCvv00654 ,
    CSCvv00643
    CVE ID: CVE-2021-1250
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 5.9
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
   
    CVE-2021-1253: Cisco DCNM Persistent Cross-Site Scripting Vulnerabilities

    Multiple vulnerabilities in the web-based management interface of Cisco
    DCNM could allow an authenticated, remote attacker to conduct an XSS attack
    against a user of the interface.

    These vulnerabilities are due to insufficient input validation by the
    web-based management interface. An attacker could exploit these
    vulnerabilities by inserting malicious data into a specific data field in
    the interface. A successful exploit could allow the attacker to execute
    arbitrary script code in the context of the affected interface or access
    sensitive, browser-based information.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    Bug ID(s): CSCvv07930 , CSCvv00646
    CVE ID: CVE-2021-1253
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 5.9
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L

Workarounds

  o There are no workarounds that address these vulnerabilities.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, Cisco Data Center Network Manager releases 11.5
    (1) and later contained the fix for these vulnerabilities.

    See the Details section in the bug ID(s) at the top of this advisory for
    the most complete and current information.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerabilities that are
    described in this advisory.

Source

  o These vulnerabilities were found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-xss-vulns-GuUJ39gh

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=QwFo
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0246 – [Cisco] Cisco Data Center Network Manager: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2021/01/21/esb-2021-0246-cisco-cisco-data-center-network-manager-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0246-cisco-cisco-data-center-network-manager-multiple-vulnerabilities

ESB-2021.0245 – [Win] Cisco Advanced Malware Protection for Endpoints and Immunet for Windows: Execute arbitrary code/commands – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0245
        Cisco Advanced Malware Protection for Endpoints and Immunet
                  for Windows DLL Hijacking Vulnerability
                              21 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco Advanced Malware Protection for Endpoints and Immunet for Windows
Publisher:         Cisco Systems
Operating System:  Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-1280  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-5PAZ3hRV

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco Advanced Malware Protection for Endpoints and Immunet for Windows DLL
Hijacking Vulnerability

Priority:        High
Advisory ID:     cisco-sa-amp-imm-dll-5PAZ3hRV
First Published: 2021 January 20 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvv53346
CVE Names:       CVE-2021-1280
CWEs:            CWE-427

Summary

  o A vulnerability in the loading mechanism of specific DLLs of Cisco Advanced
    Malware Protection (AMP) for Endpoints for Windows and Immunet for Windows
    could allow an authenticated, local attacker to perform a DLL hijacking
    attack. To exploit this vulnerability, the attacker would need valid
    credentials on the Windows system.

    This vulnerability is due to incorrect handling of directory search paths
    at run time. An attacker could exploit this vulnerability by placing a
    malicious DLL file on the targeted system. This file will execute when the
    vulnerable application launches. A successful exploit could allow the
    attacker to execute arbitrary code on the targeted system with SYSTEM 
    privileges.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-5PAZ3hRV

Affected Products

  o Vulnerable Products

    This vulnerability affects the following products:

       All Cisco AMP for Endpoints for Windows releases earlier than Release
        7.3.3
       All Immunet for Windows releases earlier than Release 7.3.12

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

    Cisco has confirmed that this vulnerability does not affect the following
    Cisco products:

       AMP for Endpoints for Linux
       AMP for Endpoints for Mac

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c
    /en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    Cisco fixed this vulnerability in the following releases:

       Cisco AMP for Endpoints for Windows releases 7.3.3 and later
       Immunet for Windows releases 7.3.12 and later

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any malicious use of the vulnerability that is described in this advisory.

Source

  o Cisco would like to thank Hou JingYi of Qihoo 360 CERT for initially
    reporting this vulnerability. Cisco would also like to thank Kyriakos
    Economou and Tom Wilson of ZeroPeril Ltd. for their report on this
    vulnerability.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-imm-dll-5PAZ3hRV

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-JAN-20  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=tCkb
-----END PGP SIGNATURE-----

Read More

The post ESB-2021.0245 – [Win] Cisco Advanced Malware Protection for Endpoints and Immunet for Windows: Execute arbitrary code/commands – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2021/01/21/esb-2021-0245-win-cisco-advanced-malware-protection-for-endpoints-and-immunet-for-windows-execute-arbitrary-code-commands-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0245-win-cisco-advanced-malware-protection-for-endpoints-and-immunet-for-windows-execute-arbitrary-code-commands-existing-account

Microsoft Releases New Info on SolarWinds Attack Chain

Threat actors went to elaborate lengths to maintain operational security around second-stage payload activation, company says.

The post Microsoft Releases New Info on SolarWinds Attack Chain appeared first on Malware Devil.



https://malwaredevil.com/2021/01/21/microsoft-releases-new-info-on-solarwinds-attack-chain/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-releases-new-info-on-solarwinds-attack-chain

Wednesday, January 20, 2021

Critical Cisco SD-WAN Bugs Allow RCE Attacks

Cisco is stoppering critical holes in its SD-WAN solutions and its smart software manager satellite.
Read More

The post Critical Cisco SD-WAN Bugs Allow RCE Attacks appeared first on Malware Devil.



https://malwaredevil.com/2021/01/20/critical-cisco-sd-wan-bugs-allow-rce-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=critical-cisco-sd-wan-bugs-allow-rce-attacks

NVIDIA Gamers Face DoS, Data Loss from Shield TV Bugs

The company also issued patches for Tesla-based GPUs as part of an updated, separate security advisory.
Read More

The post NVIDIA Gamers Face DoS, Data Loss from Shield TV Bugs appeared first on Malware Devil.



https://malwaredevil.com/2021/01/20/nvidia-gamers-face-dos-data-loss-from-shield-tv-bugs/?utm_source=rss&utm_medium=rss&utm_campaign=nvidia-gamers-face-dos-data-loss-from-shield-tv-bugs

Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021

Executives are very good at making decisions based upon risk, but cyber risk is still not clearly communicated in basic terms. This is a legacy issue in cyber, and much of what we build at CyberSaint seeks to address this problem. Evaluating outcomes is a complex, data-driven process, and we have been fortunate in that some of our larger customers have been helping us drive innovation on this score across very large use cases that require risk metrics across thousands of assets so that decision can be made around risk reduction at the top. 

The post Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021 appeared first on Security Boulevard.

Read More

The post Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/20/taming-the-vast-sea-of-data-commentary-on-cisas-strategy-for-2021-5/?utm_source=rss&utm_medium=rss&utm_campaign=taming-the-vast-sea-of-data-commentary-on-cisas-strategy-for-2021-5

Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021

Executives are very good at making decisions based upon risk, but cyber risk is still not clearly communicated in basic terms. This is a legacy issue in cyber, and much of what we build at CyberSaint seeks to address this problem. Evaluating outcomes is a complex, data-driven process, and we have been fortunate in that some of our larger customers have been helping us drive innovation on this score across very large use cases that require risk metrics across thousands of assets so that decision can be made around risk reduction at the top. 

The post Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021 appeared first on Security Boulevard.

Read More

The post Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/20/taming-the-vast-sea-of-data-commentary-on-cisas-strategy-for-2021-4/?utm_source=rss&utm_medium=rss&utm_campaign=taming-the-vast-sea-of-data-commentary-on-cisas-strategy-for-2021-4

Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021

Executives are very good at making decisions based upon risk, but cyber risk is still not clearly communicated in basic terms. This is a legacy issue in cyber, and much of what we build at CyberSaint seeks to address this problem. Evaluating outcomes is a complex, data-driven process, and we have been fortunate in that some of our larger customers have been helping us drive innovation on this score across very large use cases that require risk metrics across thousands of assets so that decision can be made around risk reduction at the top. 

The post Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021 appeared first on Security Boulevard.

Read More

The post Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/20/taming-the-vast-sea-of-data-commentary-on-cisas-strategy-for-2021-3/?utm_source=rss&utm_medium=rss&utm_campaign=taming-the-vast-sea-of-data-commentary-on-cisas-strategy-for-2021-3

Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021

Executives are very good at making decisions based upon risk, but cyber risk is still not clearly communicated in basic terms. This is a legacy issue in cyber, and much of what we build at CyberSaint seeks to address this problem. Evaluating outcomes is a complex, data-driven process, and we have been fortunate in that some of our larger customers have been helping us drive innovation on this score across very large use cases that require risk metrics across thousands of assets so that decision can be made around risk reduction at the top. 

The post Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021 appeared first on Security Boulevard.

Read More

The post Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/20/taming-the-vast-sea-of-data-commentary-on-cisas-strategy-for-2021-2/?utm_source=rss&utm_medium=rss&utm_campaign=taming-the-vast-sea-of-data-commentary-on-cisas-strategy-for-2021-2

Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021

Executives are very good at making decisions based upon risk, but cyber risk is still not clearly communicated in basic terms. This is a legacy issue in cyber, and much of what we build at CyberSaint seeks to address this problem. Evaluating outcomes is a complex, data-driven process, and we have been fortunate in that some of our larger customers have been helping us drive innovation on this score across very large use cases that require risk metrics across thousands of assets so that decision can be made around risk reduction at the top. 

The post Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021 appeared first on Security Boulevard.

Read More

The post Taming the Vast Sea of Data: Commentary on CISA’s Strategy for 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/01/20/taming-the-vast-sea-of-data-commentary-on-cisas-strategy-for-2021/?utm_source=rss&utm_medium=rss&utm_campaign=taming-the-vast-sea-of-data-commentary-on-cisas-strategy-for-2021

Zoom watermarking: pros and cons

Metadata, which gives background information on pieces of data, is typically hidden. It becomes a problem when accidentally revealed. Often tied to photography mishaps, it can be timestamps. It might be location. In some cases, it can be log analysis. Many tutorials exist to strip this information out. This is because it can reveal more than intended when it hits the public domain. Default settings are often to blame. For example, a mobile photography app or camera may embed GPS data by default.

Some people may find this useful; quite a few more may object to it as a creepy privacy invasion.

Well, that’s metadata. Now you have an idea what kind of things can lurk without knowledge. We can see what happens when we deliberately enable a data / tagging related function.

Watermarking: what’s the deal?

An interesting story has recently emerged on The Intercept, of voluntary data (in the form of watermarks) wrapped into Zoom recordings, which could cause headaches in unexpected ways. Watermarks aren’t hidden—they’re right there by design, if people choose to use them. And the visual side of this data is supposed to be viewable during the call.

The Intercept talks about accidental identity reveals, via data embedded into calls, in relation to the ever-present videoconferencing tool. You’d be forgiven for thinking the identity reveal referenced in the article had something to do with the watermarks, but no.

The reveal happened because someone recorded a video call and dropped it online, with participant’s faces on display. The people involved appear to be at least reasonably well known. The secret identity game was up regardless of what was under the hood.

Cause and effect

What the rest of the article is about, is theorising on the ways embedded metadata could cause issues for participants. Zoom allows for video and audio watermarking, with video of course being visual and so easier to spot. Video displays a portion of a user’s email address when someone is sharing their screen. Audio embeds the information of anyone recording the call into the audio, and Zoom lets you know who shared it. You must ask Zoom to do this, and the clip has to be more than 2 minutes in length.

Essentially, video watermarking is to help you know who is sharing and talking during the call. Audio watermarking is to allow you to figure out if someone is sharing without permission. The Intercept explores ways this could cause problems where confidentiality is a concern.

Some identity caveats

If Zoom content is shared online without permission, it may not matter much if revealing metadata is included, unless the video call is audio only. This is because people can be easy to identify visually. Is a public figure of some sort involved? The game is already lost. If they’re not normally a public facing persona, people could still find them via reverse image search or other matching tools. And if they can’t, a well-known location, or a name-badge, could give them away. There are so many variables at work, only the participants may know for sure.

Hunting the leaker: does it matter?

While the other concern of identifying the leaker is still important, your mileage may vary in terms of how useful it is, versus how much of an inadvertent threat it presents. It’s possible the leaker may not care much if they’re revealed. They may have used a fake identity, or even compromised a legitimate account in order to do the leaking.

It’s also possible that someone with a grudge could leak something then pretend they’d been compromised. If this happened, would you have a way of being able to determine the truth of the matter? Or would you simply take their word for it?

Weighing up the risk

All good questions, and a valuable reminder to consider which videoconferencing tools you want to make use of. For some organisations and individuals, there’s a valid use for the metadata dropped into the files. For others, it might be safer on balance to leave them out. It might even be worth using a virtual background instead of something which reveals personal information. It might be worth asking if you even need video at all, depending on sensitivity of call.

The choice, as always, is yours.

The post Zoom watermarking: pros and cons appeared first on Malwarebytes Labs.

The post Zoom watermarking: pros and cons appeared first on Malware Devil.



https://malwaredevil.com/2021/01/20/zoom-watermarking-pros-and-cons/?utm_source=rss&utm_medium=rss&utm_campaign=zoom-watermarking-pros-and-cons

DEF CON 28 Safe Mode IoT Village – Mark Bereza’s ‘VULNtron 4 CVEs Turn A Teleconference Bot Into A Spy’

Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization’s DEFCON 28 SAFE MODE Conference, and on the DEF CON YouTube channel. Enjoy!

Permalink

The post DEF CON 28 Safe Mode IoT Village – Mark Bereza’s ‘VULNtron 4 CVEs Turn A Teleconference Bot Into A Spy’ appeared first on Security Boulevard.

Read More

The post DEF CON 28 Safe Mode IoT Village – Mark Bereza’s ‘VULNtron 4 CVEs Turn A Teleconference Bot Into A Spy’ appeared first on Malware Devil.



https://malwaredevil.com/2021/01/20/def-con-28-safe-mode-iot-village-mark-berezas-vulntron-4-cves-turn-a-teleconference-bot-into-a-spy/?utm_source=rss&utm_medium=rss&utm_campaign=def-con-28-safe-mode-iot-village-mark-berezas-vulntron-4-cves-turn-a-teleconference-bot-into-a-spy

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...