Title: Cisco FireSIGHT Management Center Certificate Validation Vulnerability Blog URL: http://ift.tt/1WVwyv9 Vendor: Cisco Product: FireSIGHT Management Center Affected Versions: 5.2.x, 5.3.x, 5.4.x Advisory URL: http://ift.tt/1ObkkXF CVE: CVE-2015-6357 CVSS: 5.1 The Cisco FireSIGHT Management Center appliance is used to manage Cisco FirePOWER Intrusion Prevention Systems (IPS), also known as Sourcefire IPS. FireSIGHT is responsible for downloading updated IPS signatures and installing them on managed IPS devices. On its own the Cisco FireSIGHT Management Center Certificate Validation Vulnerability is a medium severity vulnerability with a CVSS of 5.1. However, this vulnerability is an example of why SSL certificate validation is so important. In this exploit I will demonstrate how the vulnerability can be leveraged to obtain privileged remote command execution on a Cisco FireSIGHT system. The exploit chains the SSL validation vulnerability with the software update process on the Cisco FireSIGHT system to trick the target system into downloading a malicious update and executing it to obtain a reverse shell with **root** privileges. Read the full advisory at http://ift.tt/1WVwyv9 Credits: This security vulnerability was found by Matthew Flanagan. Disclosure Timeline: - 2015-08-31 Vulnerability discovered in FireSIGHT 5.4.x and exploit developed by Matthew Flanagan. - 2015-09-01 Initial contact made with Cisco PSIRT psirt@cisco.com. - 2015-09-01 PSIRT responded asking for more information. - 2015-09-01 Matthew Flanagan provided PSIRT with full write up and exploit of vulnerability. - 2015-09-02 PSIRT raised FireSIGHT defect and incident PSIRT-190974966. - 2015-09-15 Matthew Flanagan reported to Cisco PSIRT that versions 5.2.0 and 5.3.0 are also vulnerable. - 2015-10-16 PSIRT advised me of the CVSS score they assigned to the vulnerability. - 2015-11-09 PSIRT assigned CVE ID CVE-2015-6357. - 2015-11-16 [Cisco FireSIGHT Management Center Certificate Validation Vulnerability][3] published. - 2015-11-16 Matthew Flanagan's findings published.
Source: Gmail -> IFTTT-> Blogger
No comments:
Post a Comment