Critical Cisco Vulnerabilities Across Multiple Products, Exploit Code for CVE-2019-1913 Reportedly Released

Satnam Narang

Cisco published new advisories for Integrated Management Controller (IMC) and Unified Computing System (UCS) Director, and updates for Small Business 220 Series Smart Switches that include the existence of public exploit code. 

Background

On August 21, Cisco published 27 new advisories and updated six advisories across a variety of its products.

Analysis

Twelve of the advisories address vulnerabilities in Cisco Integrated Management Controller (IMC) used to manage Cisco Unified Computing System (UCS) C-Series Rack Servers and S-Series Storage Servers. Six advisories are for vulnerabilities affecting Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data. Four of the six advisories are rated by Cisco as Critical.

CVEProductsImpactTypeCVSSv3 (Vendor)SeverityCVE-2019-1938Cisco UCS Director and Cisco UCS Director Express for Big Data APIAuthentication BypassUnauthenticated9.8CriticalCVE-2019-1935Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big DataUser Default CredentialsUnauthenticated9.8CriticalCVE-2019-1937Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big DataAuthentication BypassUnauthenticated9.8CriticalCVE-2019-1974Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big DataAuthentication BypassUnauthenticated9.8CriticalCVE-2019-12634Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big DataCommand InjectionUnauthenticated8.6HighCVE-2019-1936Cisco IMC Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big DataCommand InjectionAuthenticated7.2High

Five of the six vulnerabilities could be exploited by an unauthenticated, remote attacker sending specially crafted requests to a vulnerable system. CVE-2019-1936 can only be exploited by an authenticated, remote attacker who is capable of logging into the vulnerable management interface. However, with CVE-2019-1935, an attacker could exploit this vulnerability by using the ‘scpuser’ account. According to Cisco, this default account has “incorrect permission settings” and uses an “undocumented default password” to log into a vulnerable system. Tenable has not yet confirmed whether use of the scpuser account would allow an attacker to exploit CVE-2019-1936.

Cisco also patched several additional IMC vulnerabilities this month.

CVEImpactCVSSv3SeverityCVE-2019-1907Privilege Escalation8.8HighCVE-2019-1865Command Injection8.8HighCVE-2019-1864Command Injection8.8HighCVE-2019-1900Denial of Service7.5HighCVE-2019-1908Information Disclosure7.5HighCVE-2019-1896Command Injection7.2HighCVE-2019-1885Command Injection7.2HighCVE-2019-1634Command Injection7.2HighCVE-2019-1850Command Injection7.2HighCVE-2019-1871Buffer Overflow7.2HighCVE-2019-1883Command Injection7.0HighCVE-2019-1863Privilege Escalation6.5High

In addition to these new advisories, Cisco released several updates for previously published advisories. This includes updates to the recently reported vulnerabilities in the Cisco Small Business 220 Series Smart Switches from August 6.

CVEImpactCVSSv3Tenable VPRSeverityCVE-2019-1913Remote Code Execution9.88.9CriticalCVE-2019-1912Authentication Bypass9.18.3CriticalCVE-2019-1914Command Injection7.28.6Medium

Two of the three 220 Series Smart Switches vulnerabilities are rated as Critical and exist within the web management interface of these devices. Sending specially crafted requests to the vulnerable interface could allow a remote attacker to execute arbitrary code (CVE-2019-1913) or modify the device configuration (CVE-2019-1912). CVE-2019-1914 requires an attacker to be authenticated on a vulnerable interface and have level 15 permissions.

Additionally, Cisco updated its advisory for CVE-2019-1649, the Secure Boot Hardware Tampering Vulnerability known as Thrangrycat, to account for additional vulnerable products.

Proof of concept

Cisco’s Product Security Incident Response Team (PSIRT) notes in the updated advisories for the Small Business 220 Series Smart Switches that they are aware of the presence of public exploit code for these devices. However, at the time this blog post was published, Tenable has not identified a proof of concept (PoC) for these vulnerabilities.

Solution

Cisco has released updates for each of the affected products. The affected versions and relevant fixed versions can be found under the advisory pages. Customers should obtain and install these updates as soon as possible.

Identifying affected systems

A list of Tenable plugins to identify these vulnerabilities will appear here as they’re released.

Get more information 

Join Tenable's Security Response Team on the Tenable Community.

Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface.

Get a free 60-day trial of Tenable.io Vulnerability Management.

Read more >

Published on Aug 22, 2019

People also viewed

Business Cost Analyst - Cloud Infrastructure

San Jose California United States E Santa Clara St., San Jose, California, United States, 95113 Engineering Engineering
Your Role:Tenable is seeking a Business Cost Analyst of Cloud Infrastructure with strong MS Excel experience to assess, analyze and compile current costs and potentially determine initiatives to reduce and improve our cloud infrastructure cost for...

Professional Services Engagement Manager

Singapore Singapore Singapore North Bridge Road, Parkview Square, Singapore, 188788 Professional Services Professional Services
Your Role:The Professional Services Engagement Manager assists in the professional services business development and oversees the delivery of projects. The Professional Services Engagement Manager’s roles include tactical project management oversi...

UX Designer

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Engineering Engineering
Your Role:Tenable is looking for an extraordinary Senior UX Designer to join our team. Our group is chartered with creating the next generation of security products while at the same time pioneering unprecedented user experience in the digital sec...

Commercial Territory Manager - West

Columbia Maryland United States Columbia Gateway Drive, Columbia, Maryland, United States, 21046 Sales Sales
Your Role:The Commercial Territory Manager will meet and exceed quarterly sales quota by developing new opportunities within specific geographical territory.  Researching and identifying potential accounts; outbound cold calling to soliciting new ...

Senior Software Engineer (Java & Kotlin)

San Jose California United States E Santa Clara St., San Jose, California, United States, 95113 Engineering Engineering
Your Role:Tenable is looking for a Senior Software Engineer to join the Lumin product development team. As a Sr. Software Engineer you will drive projects end-to-end, collaborate on product requirements with Product Managers, architect and impleme...

Public Sector Channel Manager - Distribution

Reston Virginia United States Reston, Virginia, United States Channel Sales Sales
Your Role:The Public Sector Channel Manager-Distribution is responsible for establishing and managing relationships with the Distribution Partner(s).  The CM-Disty will act as a sales liaison between distributor and Tenable Channel Manager personn...

We have big plans for continued global growth, and we’re looking for people who are creative, flexible and dedicated to helping us build something great – something that matters.