Vulnerability Discovered in Cisco Web Framework of Cisco UCS Performance Manager Could Allow for Arbitrary Command Execution

ITS Advisory Number: 
2016-122
Date(s) Issued: 
Thursday, July 21, 2016
Subject: 
Vulnerability Discovered in Cisco Web Framework of Cisco UCS Performance Manager Could Allow for Arbitrary Command Execution
Overview: 

A vulnerability in the web framework of Cisco Unified Computing System (UCS) Performance Manager could allow an authenticated, remote attacker to execute arbitrary commands. This vulnerability is due to insufficient input validation performed on parameters that are passed via an HTTP GET request. An attacker could exploit this vulnerability by sending crafted HTTP GET requests to an affected system. An exploit could allow the attacker to execute arbitrary commands with the privileges of the root user.

Systems Affected: 
  • Cisco UCS Performance Manager versions 2.0.0 and prior
RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
N/A
Description: 

A vulnerability in the web framework of Cisco Unified Computing System (UCS) Performance Manager could allow an authenticated, remote attacker to execute arbitrary commands. Details of this vulnerability is as follows:

Vulnerability is due to insufficient input validation performed on parameters that are passed via an HTTP GET request. An attacker could exploit this vulnerability by sending crafted HTTP GET requests to an affected system allowing the attacker to execute arbitrary commands with the privileges of the root user. (CVE-2016-1374)

Actions: 
  • After appropriate testing, install applicable updates provided by Cisco to the affected systems.
  • Verify no unauthorized system modifications have occurred on the system prior to applying the patch.
  • Monitor intrusion detection systems for any signs of anomalous activity.