First published: Fri Jan 11 2019(Updated: )
A vulnerability in the Graphite web interface of the Policy and Charging Rules Function (PCRF) of Cisco Policy Suite (CPS) could allow an unauthenticated, remote attacker to access the Graphite web interface. The attacker would need to have access to the internal VLAN where CPS is deployed. The vulnerability is due to lack of authentication. An attacker could exploit this vulnerability by directly connecting to the Graphite web interface. An exploit could allow the attacker to access various statistics and Key Performance Indicators (KPIs) regarding the Cisco Policy Suite environment.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Policy Suite | =12.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15466 has been assigned a high severity rating due to the potential for unauthorized access to sensitive interfaces.
To remediate CVE-2018-15466, you should apply the latest security updates provided by Cisco for the affected version of the Policy Suite.
CVE-2018-15466 affects users of Cisco Policy Suite for Mobile version 12.0.0 that have the Graphite web interface exposed.
An attacker exploiting CVE-2018-15466 could gain unauthorized access to the Graphite web interface and potentially manipulate or exfiltrate data.
Yes, CVE-2018-15466 allows unauthenticated remote attackers to exploit the vulnerability if they are on the internal VLAN.