First published: Thu Jan 10 2019(Updated: )
A vulnerability in the Redis implementation used by the Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent software could allow an unauthenticated, remote attacker to modify key-value pairs for short-lived events stored by the Redis server. The vulnerability is due to improper authentication when accessing the Redis server. An unauthenticated attacker could exploit this vulnerability by modifying key-value pairs stored within the Redis server database. An exploit could allow the attacker to reduce the efficiency of the Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent software.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Policy Suite | ||
Cisco Policy Suite | =13.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0181 has a medium severity rating based on the potential impact on the affected systems.
To mitigate CVE-2018-0181, upgrade to the fixed versions of the affected Cisco Policy Suite software as recommended in the advisory.
CVE-2018-0181 affects users of Cisco Policy Suite for Mobile version 13.0.0 and Cisco Policy Suite Diameter Routing Agent.
CVE-2018-0181 can be exploited by an unauthenticated, remote attacker to modify key-value pairs in the Redis server.
The impact of CVE-2018-0181 includes unauthorized manipulation of short-lived events stored in the Redis server within the affected Cisco applications.