First published: Fri Dec 01 2017(Updated: )
The Cisco Umbrella Virtual Appliance Version 2.0.3 and prior contained an undocumented encrypted remote support tunnel (SSH) which auto initiated from the customer's appliance to Cisco's SSH Hubs in the Umbrella datacenters. These tunnels were primarily leveraged for remote support and allowed for authorized/authenticated personnel from the Cisco Umbrella team to access the appliance remotely and obtain full control without explicit customer approval. To address this vulnerability, the Umbrella Virtual Appliance version 2.1.0 now requires explicit customer approval before an SSH tunnel from the VA to the Cisco terminating server can be established.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Umbrella | <=2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6679 is categorized as a medium severity vulnerability due to the potential for unauthorized access through an encrypted remote support tunnel.
To remediate CVE-2017-6679, upgrade to Cisco Umbrella Virtual Appliance version 2.0.4 or later.
CVE-2017-6679 affects all versions of Cisco Umbrella Virtual Appliance up to and including 2.0.3.
The risks include potential unauthorized access to the system through the undetected remote support tunnel.
There is no documented workaround for CVE-2017-6679, so upgrading the software is strongly recommended.