
====================================================================

                           CERT-Renater

               Note d'Information No. 2016/VULN149
_____________________________________________________________________

DATE                : 06/04/2016

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Cisco Prime Infrastructure,
                        Cisco Evolved Programmable Network Manager.

======================================================================
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-privauth
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-remcode
_____________________________________________________________________

Cisco Prime Infrastructure and Evolved Programmable Network Manager
Privilege Escalation API Vulnerability

Advisory ID: cisco-sa-20160406-privauth

Revision 1.0

For Public Release 2016 April 6 16:00 UTC (GMT)

+---------------------------------------------------------------------

Summary
=======

A vulnerability in the application programming interface (API) web
interface of Cisco Prime Infrastructure and Cisco Evolved Programmable
Network Manager (EPNM) could allow an authenticated, remote attacker to
gain elevated privileges.

The vulnerability is due to improper role-based access control (RBAC)
when an unexpected HTTP URL request is received that does not match an
expected pattern filter. An attacker could exploit this vulnerability
by sending a crafted HTTP request with a modified URL to bypass RBAC
settings. An exploit could allow the attacker to gain elevated
privileges on the application to view and edit unauthorized data.

Cisco has released software updates that address this vulnerability.
Workarounds are not available.

This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-privauth

_____________________________________________________________________

Cisco Prime Infrastructure and Evolved Programmable Network Manager
Remote Code Execution Vulnerability

Advisory ID: cisco-sa-20160406-remcode

Revision 1.0

For Public Release 2016 April 6 16:00 UTC (GMT)

+---------------------------------------------------------------------

Summary
=======

A vulnerability in the web interface of Cisco Prime Infrastructure and
Cisco Evolved Programmable Network Manager (EPNM) could allow an
unauthenticated, remote attacker to execute arbitrary code on a
targeted system.

The vulnerability is due to insufficient sanitization of HTTP
user-supplied input. An attacker could exploit this vulnerability by
sending an HTTP POST with crafted deserialized user data. An exploit
could allow the attacker to execute arbitrary code with root-level
privileges on the affected system, which could be used to conduct
further attacks.

Cisco has released software updates that address this vulnerability.
Workarounds are not available.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-remcode

==========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================






