==================================================================== CERT-Renater Note d'Information No. 2016/VULN234 _____________________________________________________________________ DATE : 02/06/2016 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Cisco Prime Network Analysis Module (NAM) releases, Cisco Prime Virtual Network Analysis Module (vNAM) releases. ====================================================================== http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime3 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime2 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime1 ____________________________________________________________________ Cisco Prime Network Analysis Module IPv6 Denial of Service Vulnerability Advisory ID: cisco-sa-20160601-prime3 Revision 1.0 For Public Release 2016 June 1 16:00 UTC (GMT) +--------------------------------------------------------------------- Summary ======= A vulnerability in the IPv6 packet decode function of the Cisco Network Analysis Module (NAM) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to an improper calculation of the IPv6 payload length of certain IPv6 packets. An attacker could exploit this vulnerability by sending crafted IPv6 packets on the network where the NAM is collecting and monitoring traffic. An exploit could allow the attacker to cause a DoS condition and the NAM could cease to collect and monitor traffic for a short time. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime3 ____________________________________________________________________ Cisco Security Advisory: Cisco Prime Network Analysis Module Unauthenticated Remote Code Execution Vulnerability Advisory ID: cisco-sa-20160601-prime Version 1.0: Final For public release: 2016 June 1 16:00 GMT +--------------------------------------------------------------------- Summary ======= A vulnerability in the web interface of Cisco Network Analysis Modules could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of the affected device with the privileges of the web server. The vulnerability is due to a failure to properly sanitize user input prior to executing an external command derived from the input. An attacker could exploit the vulnerability by submitting a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands or code on the underlying operating system with the reduced privileges of the web server. Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime ____________________________________________________________________ Cisco Prime Network Analysis Module Authenticated Remote Code Execution Vulnerability Medium Advisory ID: cisco-sa-20160601-prime2 Published: 2016 June 1 16:00 GMT Version 1.0: Final CVSS Score: Base - 6.5 Workarounds: No workarounds available Cisco Bug IDs: CSCuy21889 CVE-2016-1391 CWE-20 A vulnerability in the web interface of Cisco Prime Network Analysis Module (NAM) and Cisco Prime Virtual Network Analysis Module (vNAM) could allow an authenticated, remote attacker to execute arbitrary commands or code on the host operating system with the privileges of the web server. The vulnerability is due to insufficient sanitization of user-supplied input before the input is used in subsequent operations. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to execute arbitrary commands or code on the host operating system with the reduced privileges of the web server. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime2 ____________________________________________________________________ Cisco Prime Network Analysis Module Local Command Injection Vulnerability Advisory ID: cisco-sa-20160601-prime1 Published: 2016 June 1 16:00 GMT Version 1.0: Final CVSS Score: Base - 6.8 Workarounds: No workarounds available Cisco Bug IDs: CSCuy21892 CVE-2016-1390 CWE-20 Summary A vulnerability in the command-line interface (CLI) of Cisco Prime Network Analysis Module (NAM) and Cisco Prime Virtual Network Analysis Module (vNAM) could allow a local, authenticated attacker to execute arbitrary commands on the host operating system with elevated privileges. The vulnerability is due to insufficient sanitization of user-supplied input that is passed to a specific command before the input is used in subsequent operations. An attacker could exploit this vulnerability by submitting crafted input to the command. A successful exploit could allow the attacker to execute arbitrary commands on the host operating system with root privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160601-prime1 ========================================================== Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================