Cisco Prime Network Control System Unauthorized Configuration Vulnerability

Cisco-SA-20150609-CVE-2015-0768 · Medium · Published · Updated

A vulnerability in the authentication, authorization, and accounting (AAA) user roles of the Cisco Prime Network Control System (NCS) network management application could allow an authenticated, remote attacker who is logged in as a system monitor user to perform configuration tasks. The vulnerability is due to inconsistent AAA user role implementation, which allows the configuration feature of the Device Work Center (DWC) to be accessible to unauthorized users. An attacker could exploit this vulnerability by logging in as a lower-privileged user and performing actions that should be restricted. An exploit could allow the attacker to elevate privileges and perform commands that should be restricted. Cisco has confirmed the vulnerability and released software updates. To exploit this vulnerability, an attacker must authenticate to the targeted device. This access requirement decreases the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to allow only privileged users to access administration or management systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2015-0768
Cisco Bug IDsCSCur27371
CVSS ScoreBase 5.5
Base 5.5 AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:OF/RC:C

Public Affected Products