SK-CERT Bezpečnostné varovanie V20190502-06

Dôležitosť Kritická
Klasifikácia Neutajované/TLP WHITE
CVSS Skóre
9.8
Identifikátor
Viacero zraniteľností v produktoch Cisco
Popis
Spoločnosť Cisco vydala bezpečnostné aktualizácie na svoje produkty, ktoré opravujú viacero bezpečnostných zraniteľností.
Najzávažnejšia je kritická zraniteľnosť vo switchoch Cisco Nexus 9000 Series. Bezpečnostná zraniteľnosť spočíva v existencii zabudovaného kľúčového páru SSH, ktorú by vzdialený neautentifikovaný útočník mohol zneužiť na získanie neoprávneného prístupu do systému s oprávneniami úrovne root. Bezpečnostnú zraniteľnosť je možné zneužiť len prostredníctvom protokolu IPv6.
Ostatné zraniteľnosti by útočník mohol zneužiť na vykonanie škodlivého kódu, zneprístupnenie služby, neoprávnený prístup do systému, eskaláciu privilégií a neoprávnený prístup k citlivým údajom.
Dátum prvého zverejnenia varovania
01.05.2019
CVE
CVE-2018-15388, CVE-2018-15462, CVE-2018-15465, CVE-2019-1586, CVE-2019-1587, CVE-2019-1589, CVE-2019-1590, CVE-2019-1592, CVE-2019-1635, CVE-2019-1682, CVE-2019-1687, CVE-2019-1693, CVE-2019-1694, CVE-2019-1695, CVE-2019-1696, CVE-2019-1697, CVE-2019-1699, CVE-2019-1701, CVE-2019-1703, CVE-2019-1704, CVE-2019-1705, CVE-2019-1706, CVE-2019-1708, CVE-2019-1709, CVE-2019-1713, CVE-2019-1714, CVE-2019-1715, CVE-2019-1724, CVE-2019-1803, CVE-2019-1804, CVE-2019-1807, CVE-2019-1816, CVE-2019-1817, CVE-2019-1836, CVE-2019-1838, CVE-2019-1844, CVE-2019-1852, CVE-2019-1854, CVE-2019-1856, CVE-2019-1857, CVE-2019-1859
CVE
Zasiahnuté systémy
Nexus 9000 staršie ako 14.1(1i)
3000 Series Industrial Security Appliances (ISAs)
Adaptive Security Appliance (ASA) 1000V Cloud Firewall
ASA 5505 Adaptive Security Appliance
ASA 5500-X Firewally
ASA Services Module pre Cisco Catalyst 6500 Sériu Switche a Cisco 7600 Routery
Adaptive Security Virtual Appliance (ASAv)
Firepower 2100
Firepower 4100
Firepower 9300 ASA Security Modul
Firepower Threat Defense Virtual
200 Smart Switch verzie staršie ako 1.4.10.6
300 Managed Switch verzie staršie ako 1.4.10.6
500 Managed Switch verzie staršie ako 1.4.10.6
250 Smart Switch verzie staršie ako 2.5.0.78
350 Managed Switch verzie staršie ako 2.5.0.78
350X Managed Switch verzie staršie ako 2.5.0.78
550X Stackable Managed Switch verzie staršie ako 2.5.0.78
RV320 Dual Gigabit WAN VPN Router Firmware verzie staršie ako 1.4.2.20
RV325 Dual Gigabit WAN VPN Router Firmware verzie staršie ako 1.4.2.20
IP Conference Phone 7832
IP Conference Phone 8832
IP Phone 7811
IP Phone 7821
IP Phone 7841
IP Phone 7861
IP Phone 8811
IP Phone 8841
IP Phone 8845
IP Phone 8851
IP Phone 8861
IP Phone 8865
IP 8831 Conference Phone
IP 8831 Conference Phone
IP Phone 8821
IP Phone 8821-EX
Následky
Neoprávnený prístup do systému a úplné narušenie dôvernosti, integrity a dostupnosti systému
Vykonanie škodlivého kódu, Zneprístupnenie služby, Eskalácia privilégií, Neoprávnený prístup k citlivým údajom
Odporúčania
Administrátorom odporúčame bezodkladne vykonať aktualizáciu zasiahnutých systémov.
Zdroje
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-nexus9k-sshkey
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-nexus9k-rpe
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181219-asa-privesc
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181219-asa-privesc
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-filter-query
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-insecure-fabric
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-unmeasured-boot
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-encrypt
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-info-disc
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-priv-escalation
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-apic-xss
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asaftd-saml-vpn
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-csrf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-frpwrtd-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftds-ldapdos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftdtcp-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-bypass
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-entropy
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-ike-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ftd-xss
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-ipsec-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-asa-vpn-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-esa-bypass
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-expressway-traversal
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-fabric-traversal
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-firepower-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-cmd-inj
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-frpwr-smb-snort
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-ftd-cmd-inject
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-hyperflex-csrf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-pca-xss
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-phone-sip-xml-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-pnr-xss
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-sbr-hijack
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-scbv
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-sd-cpu-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-udb-sm
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-wsa-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-wsa-privesc

« Späť na zoznam