CERTFR-2018-AVI-423

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Cisco . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Cisco N/A Cisco Webex Meetings Suite (WBS33) versions antérieures à WBS33.4
Cisco N/A Cisco Umbrella Roaming Module versions antérieures à 4.6.1098
Cisco N/A Cisco Webex Teams versions antérieures à 20180417-150803
Cisco N/A Cisco Prime Access Registrar Software versions antérieures à 7.3.0.4
Cisco N/A vSmart Controller Software avec Cisco SD-WAN Solution versions antérieures à 18.3.0
Cisco N/A Cisco Webex Meetings versions antérieures à 1.3.37 (disponible à partir du 14 septembre 2018)
Cisco N/A Cisco Prime Access Registrar Software versions 8.0.x antérieures à 8.0.1.1
Cisco N/A vEdge 2000 Series Routers avec Cisco SD-WAN Solution versions antérieures à 18.3.0
Cisco N/A vBond Orchestrator Software avec Cisco SD-WAN Solution versions antérieures à 18.3.0
Cisco N/A Cisco Integrated Management Controller (IMC) versions 3.1.x antérieures à 3.1(3a)
Cisco N/A vManage Network Management System avec Cisco SD-WAN Solution versions antérieures à 18.3.0
Cisco N/A Cisco Umbrella Enterprise Roaming Client (ERC) versions antérieures à 2.1.127
Cisco N/A vEdge Cloud Router Platform avec Cisco SD-WAN Solution versions antérieures à 18.3.0
Cisco N/A Cisco Integrated Management Controller (IMC) versions 2.x et 3.0.x antérieures à 3.0(4d)
Cisco N/A Cisco Data Center Network Manager versions antérieures à 11.0(1)
Cisco N/A vEdge 1000 Series Routers avec Cisco SD-WAN Solution versions antérieures à 18.3.0
Cisco N/A Cisco Webex Meetings Server versions antérieures à 3.0MR2
Cisco N/A Cisco RV130W Wireless-N Multifunction VPN Router versions antérieures à 1.0.3.44
Cisco N/A vEdge 5000 Series Routers avec Cisco SD-WAN Solution versions antérieures à 18.3.0
Cisco N/A Cisco Umbrella API
Cisco N/A Cisco Webex Meetings Suite versions antérieures à WBS32.15.20
Cisco N/A vEdge 100 Series Routers avec Cisco SD-WAN Solution versions antérieures à 18.3.0
References
Bulletin de sécurité Cisco cisco-sa-20180905-sd-wan-escalation du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-sd-wan-validation du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-rv-routers-injection du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-umbrella-file-read du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-cdcnm-escalation du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-cpar-dos du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-rv-routers-traversal du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-rv-routers-disclosure du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-cimc-injection du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-sd-wan-injection du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-umbrella-priv du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-webex-id-mod du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-umbrella-api du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-webex-pe du 05 septembre 2018 None vendor-advisory
Bulletin de sécurité Cisco cisco-sa-20180905-rv-routers-overflow du 05 septembre 2018 None vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cisco Webex Meetings Suite (WBS33) versions ant\u00e9rieures \u00e0 WBS33.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Umbrella Roaming Module versions ant\u00e9rieures \u00e0 4.6.1098",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Webex Teams versions ant\u00e9rieures \u00e0 20180417-150803",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Prime Access Registrar Software versions ant\u00e9rieures \u00e0 7.3.0.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "vSmart Controller Software avec Cisco SD-WAN Solution versions ant\u00e9rieures \u00e0 18.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Webex Meetings versions ant\u00e9rieures \u00e0 1.3.37 (disponible \u00e0 partir du 14 septembre 2018)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Prime Access Registrar Software versions 8.0.x ant\u00e9rieures \u00e0 8.0.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "vEdge 2000 Series Routers avec Cisco SD-WAN Solution versions ant\u00e9rieures \u00e0 18.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "vBond Orchestrator Software avec Cisco SD-WAN Solution versions ant\u00e9rieures \u00e0 18.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Integrated Management Controller (IMC) versions 3.1.x ant\u00e9rieures \u00e0 3.1(3a)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "vManage Network Management System avec Cisco SD-WAN Solution versions ant\u00e9rieures \u00e0 18.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Umbrella Enterprise Roaming Client (ERC) versions ant\u00e9rieures \u00e0 2.1.127",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "vEdge Cloud Router Platform avec Cisco SD-WAN Solution versions ant\u00e9rieures \u00e0 18.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Integrated Management Controller (IMC) versions 2.x et 3.0.x ant\u00e9rieures \u00e0 3.0(4d)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Data Center Network Manager versions ant\u00e9rieures \u00e0 11.0(1)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "vEdge 1000 Series Routers avec Cisco SD-WAN Solution versions ant\u00e9rieures \u00e0 18.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Webex Meetings Server versions ant\u00e9rieures \u00e0 3.0MR2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco RV130W Wireless-N Multifunction VPN Router versions ant\u00e9rieures \u00e0 1.0.3.44",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "vEdge 5000 Series Routers avec Cisco SD-WAN Solution versions ant\u00e9rieures \u00e0 18.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Umbrella API",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Webex Meetings Suite versions ant\u00e9rieures \u00e0 WBS32.15.20",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "vEdge 100 Series Routers avec Cisco SD-WAN Solution versions ant\u00e9rieures \u00e0 18.3.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2018-0434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0434"
    },
    {
      "name": "CVE-2018-0438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0438"
    },
    {
      "name": "CVE-2018-0433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0433"
    },
    {
      "name": "CVE-2018-0436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0436"
    },
    {
      "name": "CVE-2018-0426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0426"
    },
    {
      "name": "CVE-2018-0425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0425"
    },
    {
      "name": "CVE-2018-0437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0437"
    },
    {
      "name": "CVE-2018-0423",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0423"
    },
    {
      "name": "CVE-2018-0424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0424"
    },
    {
      "name": "CVE-2018-0421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0421"
    },
    {
      "name": "CVE-2018-0435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0435"
    },
    {
      "name": "CVE-2018-0430",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0430"
    },
    {
      "name": "CVE-2018-0422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0422"
    },
    {
      "name": "CVE-2018-0431",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0431"
    },
    {
      "name": "CVE-2018-0432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0432"
    },
    {
      "name": "CVE-2018-0440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0440"
    }
  ],
  "links": [],
  "reference": "CERTFR-2018-AVI-423",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2018-09-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco\n. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-sd-wan-escalation du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-escalation"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-sd-wan-validation du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-validation"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-rv-routers-injection du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-injection"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-umbrella-file-read du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-file-read"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-cdcnm-escalation du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cdcnm-escalation"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-cpar-dos du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cpar-dos"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-rv-routers-traversal du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-traversal"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-rv-routers-disclosure du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-disclosure"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-cimc-injection du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-cimc-injection"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-sd-wan-injection du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-injection"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-umbrella-priv du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-priv"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-webex-id-mod du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-webex-id-mod"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-umbrella-api du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-umbrella-api"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-webex-pe du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-webex-pe"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180905-rv-routers-overflow du 05 septembre 2018",
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-rv-routers-overflow"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…