First published: Thu Feb 22 2018(Updated: )
A vulnerability in the authentication functionality of the web-based service portal of Cisco Elastic Services Controller Software could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrator privileges on an affected system. The vulnerability is due to improper security restrictions that are imposed by the web-based service portal of the affected software. An attacker could exploit this vulnerability by submitting an empty password value to an affected portal when prompted to enter an administrative password for the portal. A successful exploit could allow the attacker to bypass authentication and gain administrator privileges for the web-based service portal of the affected software. This vulnerability affects Cisco Elastic Services Controller Software Release 3.0.0. Cisco Bug IDs: CSCvg29809.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Elastic Services Controller | =3.0.0 | |
Cisco Virtual Managed Services | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0121 is rated as high severity due to the potential for unauthenticated remote access and execution of arbitrary actions with administrator privileges.
The fix for CVE-2018-0121 involves applying the appropriate security patches provided by Cisco for the affected versions of Elastic Services Controller and Virtual Managed Services.
CVE-2018-0121 affects Cisco Elastic Services Controller version 3.0.0 and Cisco Virtual Managed Services version 3.0.
An attacker exploiting CVE-2018-0121 can bypass authentication and execute any actions with administrative privileges on the affected systems.
Yes, CVE-2018-0121 was publicly disclosed and acknowledged in security advisories for Cisco products.