Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Cisco Fixes Critical Flaws in Ultra, Elastic Services Products

Cisco has released updates for its Ultra Services Framework and Elastic Services Controller products to address several vulnerabilities rated critical and high severity.

Cisco has released updates for its Ultra Services Framework and Elastic Services Controller products to address several vulnerabilities rated critical and high severity.

Security advisories published by the company on Wednesday describe two critical and two high severity flaws affecting the Ultra Services Platform, a software-defined mobility framework designed for mobile network operators.

The vulnerabilities affect components such as the staging server, the Ultra Automation Service (UAS), and the AutoVNF tool in releases prior to 5.0.3 and 5.1.

A remote, unauthenticated attacker can exploit the staging server bug to execute arbitrary shell commands as the Linux root user. The UAS flaw, caused by a configuration problem related to the Apache ZooKeeper service, can be exploited to gain unauthorized access to a targeted device.

“An attacker could exploit this vulnerability by accessing the affected device through the orchestrator network. An exploit could allow the attacker to gain access to ZooKeeper data nodes (znodes) and influence the behavior of the system’s high-availability feature,” Cisco said in its advisory.

The high severity flaws can be exploited to obtain admin credentials for Cisco Elastic Services Controller and Cisco OpenStack installations, and read sensitive data.

In the case of Elastic Services Controller (ESC), a cloud and systems management product, Cisco released versions 2.3.1.434 and 2.3.2 to patch a critical unauthorized access vulnerability caused by default static credentials, and a high severity command execution flaw.

Each of these security holes were discovered by Cisco itself and there is no evidence of exploitation in the wild. Nevertheless, users have been advised to install the updates as workarounds are not available for these issues.

The vulnerabilities have been assigned the following CVE identifiers: CVE-2017-6714, CVE-2017-6711, CVE-2017-6709, CVE-2017-6708, CVE-2017-6713 and CVE-2017-6712.

Cisco has also warned customers of a high severity command injection vulnerability in the CLI command-parsing code of the StarOS operating system running on ASR devices. Exploiting this vulnerability requires local access and authentication on the targeted system.

Related: Cisco Patches CIA Zero-Day Affecting Hundreds of Switches

Related: Cisco Patches Critical Flaw in Small Business Router

Related: Default Account, Debug Tool Expose Cisco Prime Users to Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.