
====================================================================

                              CERT-Renater

                 Note d'Information No. 2017/VULN203
_____________________________________________________________________

DATE                : 06/07/2017

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Cisco Ultra Services Framework.

=====================================================================
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf1
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf2
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-uas
____________________________________________________________________

Cisco Security Advisory: Cisco Ultra Services Framework AutoVNF
Symbolic Link Handling Information Disclosure Vulnerability

Advisory ID: cisco-sa-20170705-usf1

Revision: 1.0

For Public Release: 2017 July 5 16:00 GMT

Last Updated: 2017 July 5 16:00 GMT

CVE ID(s): CVE-2017-6708

CVSS Score v(3): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the symbolic link (symlink) creation functionality
of the AutoVNF tool for the Cisco Ultra Services Framework could allow
an unauthenticated, remote attacker to read sensitive files or execute
malicious code on an affected system.

The vulnerability is due to the absence of validation checks for the
input that is used to create symbolic links. A successful exploit could
allow the attacker to read any sensitive file or execute malicious code
on an affected system.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf1
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf1"]

____________________________________________________________________

Cisco Security Advisory: Cisco Ultra Services Framework AutoVNF Log
File User Credential Information Disclosure Vulnerability

Advisory ID: cisco-sa-20170705-usf2

Revision: 1.0

For Public Release: 2017 July 5 16:00 GMT

Last Updated: 2017 July 5 16:00 GMT

CVE ID(s): CVE-2017-6709

CVSS Score v(3): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the AutoVNF tool for the Cisco Ultra Services
Framework could allow an unauthenticated, remote attacker to access
administrative credentials for Cisco Elastic Services Controller (ESC)
and Cisco OpenStack deployments in an affected system.

The vulnerability exists because the affected software logs
administrative credentials in clear text for Cisco ESC and Cisco
OpenStack deployment purposes. An attacker could exploit this
vulnerability by accessing the AutoVNF URL for the location where the
log files are stored and subsequently accessing the administrative
credentials that are stored in clear text in those log files. A
successful exploit could allow the attacker to access the
administrative credentials for Cisco ESC and Cisco OpenStack
deployments in the affected system, which the attacker could use to
conduct additional attacks.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf2
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf2"]

____________________________________________________________________

Cisco Security Advisory: Cisco Ultra Services Framework UAS
Unauthenticated Access Vulnerability

Advisory ID: cisco-sa-20170705-uas

Revision: 1.0

For Public Release: 2017 July 5 16:00 GMT

Last Updated: 2017 July 5 16:00 GMT

CVE ID(s): CVE-2017-6711

CVSS Score v(3): 9.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the Ultra Automation Service (UAS) of the Cisco
Ultra Services Framework could allow an unauthenticated, remote
attacker to gain unauthorized access to a targeted device.

The vulnerability is due to an insecure default configuration of the
Apache ZooKeeper service used by the affected software. An attacker
could exploit this vulnerability by accessing the affected device
through the orchestrator network. An exploit could allow the attacker
to gain access to ZooKeeper data nodes (znodes) and influence the
behavior of the system's high-availability feature.

Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-uas
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-uas"]


==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================



