Vulnerabilities > CVE-2017-6639 - Missing Authorization vulnerability in Cisco Prime Data Center Network Manager 10.1.0/10.1(1)/10.1(2)
Summary
A vulnerability in the role-based access control (RBAC) functionality of Cisco Prime Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to access sensitive information or execute arbitrary code with root privileges on an affected system. The vulnerability is due to the lack of authentication and authorization mechanisms for a debugging tool that was inadvertently enabled in the affected software. An attacker could exploit this vulnerability by remotely connecting to the debugging tool via TCP. A successful exploit could allow the attacker to access sensitive information about the affected software or execute arbitrary code with root privileges on the affected system. This vulnerability affects Cisco Prime Data Center Network Manager (DCNM) Software Releases 10.1(1) and 10.1(2) for Microsoft Windows, Linux, and Virtual Appliance platforms. Cisco Bug IDs: CSCvd09961.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Common Weakness Enumeration (CWE)
Nessus
NASL family CISCO NASL id CISCO_PRIME_DCNM_10_2_1_LOCAL.NASL description According to its self-reported version number, the Cisco Prime Data Center Network Manager (DCNM) installed on the remote host is 10.1.x prior to 10.2.1. It is, therefore, affected by multiple vulnerabilities : - A remote code execution vulnerability exists in the role-based access control (RBAC) functionality due to a lack of authentication and authorization mechanisms for a debugging tool. An unauthenticated, remote attacker can exploit this to execute arbitrary code with root privileges. (CVE-2017-6639) - A flaw exists due to the presence of a default user account with a static password that is not automatically removed post-installation. An unauthenticated, remote attacker can exploit this to login and gain root or system-level privileges. (CVE-2017-6640) last seen 2020-06-01 modified 2020-06-02 plugin id 100843 published 2017-06-16 reporter This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/100843 title Cisco Prime Data Center Network Manager 10.1.x < 10.2.1 Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(100843); script_version("1.4"); script_cvs_date("Date: 2018/09/06 16:14:34"); script_cve_id("CVE-2017-6639", "CVE-2017-6640"); script_bugtraq_id(98935, 98937); script_xref(name:"CISCO-BUG-ID", value:"CSCvd09961"); script_xref(name:"CISCO-BUG-ID", value:"CSCvd95346"); script_xref(name:"CISCO-SA", value:"cisco-sa-20170607-dcnm1"); script_xref(name:"CISCO-SA", value:"cisco-sa-20170607-dcnm2"); script_name(english:"Cisco Prime Data Center Network Manager 10.1.x < 10.2.1 Multiple Vulnerabilities"); script_summary(english:"Checks the DCNM version number."); script_set_attribute(attribute:"synopsis", value: "A network management system installed on the remote host is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "According to its self-reported version number, the Cisco Prime Data Center Network Manager (DCNM) installed on the remote host is 10.1.x prior to 10.2.1. It is, therefore, affected by multiple vulnerabilities : - A remote code execution vulnerability exists in the role-based access control (RBAC) functionality due to a lack of authentication and authorization mechanisms for a debugging tool. An unauthenticated, remote attacker can exploit this to execute arbitrary code with root privileges. (CVE-2017-6639) - A flaw exists due to the presence of a default user account with a static password that is not automatically removed post-installation. An unauthenticated, remote attacker can exploit this to login and gain root or system-level privileges. (CVE-2017-6640)"); # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm1 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0f182f37"); script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd09961"); # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm2 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?5542fca3"); script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd95346"); script_set_attribute(attribute:"solution", value: "Upgrade to Cisco Prime Data Center Network Manager version 10.2.1 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2017/06/07"); script_set_attribute(attribute:"patch_publication_date", value:"2017/06/07"); script_set_attribute(attribute:"plugin_publication_date", value:"2017/06/16"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:prime_data_center_network_manager"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"CISCO"); script_copyright(english:"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("cisco_prime_dcnm_installed_win.nasl", "cisco_prime_dcnm_installed_linux.nasl"); script_require_ports("installed_sw/Cisco Prime DCNM"); exit(0); } include("global_settings.inc"); include("misc_func.inc"); include("vcf.inc"); app = 'Cisco Prime DCNM'; get_install_count(app_name:app, exit_if_zero:TRUE); app_info = vcf::get_app_info(app:app); vcf::check_granularity(app_info:app_info, sig_segments:3); constraints = [ {"min_version" : "10.1.1.0", "max_version" : "10.1.2.0", "fixed_version" : "10.2(1)" } ]; vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
NASL family CISCO NASL id CISCO-SA-20170607-DCNM.NASL description According to its self-reported version number, the Cisco Prime Data Center Network Manager (DCNM) installed on the remote host is 10.1.x prior to 10.2.1. It is, therefore, affected by multiple vulnerabilities : - A remote code execution vulnerability exists in the role-based access control (RBAC) functionality due to a lack of authentication and authorization mechanisms for a debugging tool. An unauthenticated, remote attacker can exploit this to execute arbitrary code with root privileges. (CVE-2017-6639) - A flaw exists due to the presence of a default user account with a static password that is not automatically removed post-installation. An unauthenticated, remote attacker can exploit this to login and gain root or system-level privileges. (CVE-2017-6640) Note that this plugin determines if DCNM is vulnerable by checking the version number displayed in the web interface. However, the web interface is not available in older versions of DCNM. last seen 2020-06-01 modified 2020-06-02 plugin id 100993 published 2017-06-22 reporter This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/100993 title Cisco Prime Data Center Network Manager 10.1.x < 10.2.1 Multiple Vulnerabilities (remote check) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(100993); script_version("1.4"); script_cvs_date("Date: 2018/09/06 16:14:34"); script_cve_id("CVE-2017-6639", "CVE-2017-6640"); script_bugtraq_id(98935, 98937); script_xref(name:"CISCO-BUG-ID", value:"CSCvd09961"); script_xref(name:"CISCO-BUG-ID", value:"CSCvd95346"); script_xref(name:"CISCO-SA", value:"cisco-sa-20170607-dcnm1"); script_xref(name:"CISCO-SA", value:"cisco-sa-20170607-dcnm2"); script_name(english:"Cisco Prime Data Center Network Manager 10.1.x < 10.2.1 Multiple Vulnerabilities (remote check)"); script_summary(english:"Checks the DCNM version number."); script_set_attribute(attribute:"synopsis", value: "A network management system running on the remote host is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "According to its self-reported version number, the Cisco Prime Data Center Network Manager (DCNM) installed on the remote host is 10.1.x prior to 10.2.1. It is, therefore, affected by multiple vulnerabilities : - A remote code execution vulnerability exists in the role-based access control (RBAC) functionality due to a lack of authentication and authorization mechanisms for a debugging tool. An unauthenticated, remote attacker can exploit this to execute arbitrary code with root privileges. (CVE-2017-6639) - A flaw exists due to the presence of a default user account with a static password that is not automatically removed post-installation. An unauthenticated, remote attacker can exploit this to login and gain root or system-level privileges. (CVE-2017-6640) Note that this plugin determines if DCNM is vulnerable by checking the version number displayed in the web interface. However, the web interface is not available in older versions of DCNM."); # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm1 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0f182f37"); script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd09961"); # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm2 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?5542fca3"); script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd95346"); script_set_attribute(attribute:"solution", value: "Upgrade to Cisco Prime Data Center Network Manager version 10.2.1 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2017/06/07"); script_set_attribute(attribute:"patch_publication_date", value:"2017/06/07"); script_set_attribute(attribute:"plugin_publication_date", value:"2017/06/22"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:prime_data_center_network_manager"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"CISCO"); script_copyright(english:"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("cisco_prime_dcnm_web_detect.nasl"); script_require_keys("installed_sw/cisco_dcnm_web"); script_require_ports("Services/www", 80); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("http.inc"); include("install_func.inc"); appname = "Cisco Prime DCNM"; app_id = "cisco_dcnm_web"; get_install_count(app_name:app_id, exit_if_zero:TRUE); port = get_http_port(default:80); install = get_single_install(app_name:app_id, port:port, exit_if_unknown_ver:TRUE); url = build_url(qs:install['path'], port:port); ver = install['version']; match = eregmatch(string:ver, pattern:"^([0-9.]+)\(([^)]+)\)"); if (isnull(match)) exit(1, "Failed to parse the version ("+ver+")."); major = match[1]; build = match[2]; # Affected (from CVRF): # 10.1(1), 10.1(2) if (major == '10.1' && build =~ "^[12]$") { report = '\n URL : ' + url + '\n Installed version : ' + ver + '\n Fixed version : 10.2(1)' + '\n'; security_report_v4(severity:SECURITY_HOLE, port:port, extra:report); } else audit(AUDIT_WEB_APP_NOT_AFFECTED, appname, url, ver);