
====================================================================

                               CERT-Renater

                   Note d'Information No. 2017/VULN026
_____________________________________________________________________

DATE                : 02/02/2017

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Cisco Prime Home.

=====================================================================
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-prime-home
____________________________________________________________________

Cisco Security Advisory: Cisco Prime Home Authentication Bypass 
Vulnerability

Advisory ID: cisco-sa-20170201-prime-home

Revision 1.0

For Public Release 2017 February 1 16:00  UTC (GMT)

+---------------------------------------------------------------------

Summary
=======

A vulnerability in the web-based GUI of Cisco Prime Home could allow
an unauthenticated, remote attacker to bypass authentication and
execute actions with administrator privileges.

The vulnerability is due to a processing error in the role-based access
control (RBAC) of URLs. An attacker could exploit this vulnerability
by sending API commands via HTTP to a particular URL without prior
authentication. An exploit could allow the attacker to perform
any actions in Cisco Prime Home with administrator privileges.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170201-prime-home

==========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================


