Cisco has released updates for its Ultra Services Framework and Elastic Services Controller products to address several vulnerabilities rated critical and high severity.
Security advisories published by the company on Wednesday describe two critical and two high severity flaws affecting the Ultra Services Platform, a software-defined mobility framework designed for mobile network operators.
The vulnerabilities affect components such as the staging server, the Ultra Automation Service (UAS), and the AutoVNF tool in releases prior to 5.0.3 and 5.1.
A remote, unauthenticated attacker can exploit the staging server bug to execute arbitrary shell commands as the Linux root user. The UAS flaw, caused by a configuration problem related to the Apache ZooKeeper service, can be exploited to gain unauthorized access to a targeted device.
“An attacker could exploit this vulnerability by accessing the affected device through the orchestrator network. An exploit could allow the attacker to gain access to ZooKeeper data nodes (znodes) and influence the behavior of the system’s high-availability feature,” Cisco said in its advisory.
In the case of Elastic Services Controller (ESC), a cloud and systems management product, Cisco released versions 126.96.36.1994 and 2.3.2 to patch a critical unauthorized access vulnerability caused by default static credentials, and a high severity command execution flaw.
Each of these security holes were discovered by Cisco itself and there is no evidence of exploitation in the wild. Nevertheless, users have been advised to install the updates as workarounds are not available for these issues.
The vulnerabilities have been assigned the following CVE identifiers: CVE-2017-6714, CVE-2017-6711, CVE-2017-6709, CVE-2017-6708, CVE-2017-6713 and CVE-2017-6712.
Cisco has also warned customers of a high severity command injection vulnerability in the CLI command-parsing code of the StarOS operating system running on ASR devices. Exploiting this vulnerability requires local access and authentication on the targeted system.