{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2018-011.pdf"
    },
    "title": "Cisco Products Multiple Vulnerabilities",
    "serial_number": "2018-011",
    "publish_date": "19-04-2018 14:36:00",
    "description": "On the 17th and 18th of April 2018, Cisco has released several updates to address vulnerabilities affecting multiple products in which a remote attacker can exploit these vulnerabilities to trigger cross site scripting, denial of service, remote code execution, security restriction bypass and sensitive information disclosure on the targeted system.",
    "url_title": "2018-011",
    "content_markdown": "---\ntitle: 'Cisco Products Multiple Vulnerabilities'\nversion: '1.0'\nnumber: '2018-011'\ndate: 'April 19, 2018'\n---\n\n_History:_\n\n* _19/04/2018 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn the 17th and 18th of April 2018, Cisco has released several updates to address vulnerabilities [1] affecting multiple products in which a remote attacker can exploit these vulnerabilities to trigger cross site scripting, denial of service, remote code execution, security restriction bypass and sensitive information disclosure on the targeted system.\n\n# Technical Details\n\nVulnerabilities impact [1, 2] is presented below.\n\n#### Critical\n\n* Cisco WebEx Clients Remote Code Execution Vulnerability.\tCVE-2018-0112\n* Cisco UCS Director Virtual Machine Information Disclosure Vulnerability for End User Portal.\tCVE-2018-0238\n* Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability. CVE-2018-0171\n\n\n#### High\n\n* Cisco IOS and IOS XE Software Smart Install Denial of Service Vulnerability.\tCVE-2018-0156\n* Cisco StarOS Interface Forwarding Denial of Service Vulnerability.\tCVE-2018-0239\n* Cisco IOS XR Software UDP Broadcast Forwarding Denial of Service Vulnerability.\tCVE-2018-0241\n* Cisco Firepower Detection Engine Secure Sockets Layer Denial of Service Vulnerability.\tCVE-2018-0233\n* Cisco Firepower 2100 Series Security Appliances IP Fragmentation Denial of Service Vulnerability.\tCVE-2018-0230\n* Cisco ASA Software, FTD Software, and AnyConnect Secure Mobility Client SAML Authentication Session Fixation Vulnerability.\tCVE-2018-0229\n* Cisco Adaptive Security Appliance Application Layer Protocol Inspection Denial of Service Vulnerabilities.\tCVE-2018-0240\n* Cisco Adaptive Security Appliance TLS Denial of Service Vulnerability.\tCVE-2018-0231\n* Cisco Adaptive Security Appliance Flow Creation Denial of Service Vulnerability.\tCVE-2018-0228\n* Cisco Adaptive Security Appliance Virtual Private Network SSL Client Certificate Bypass Vulnerability.\tCVE-2018-0227\n\n\n#### Medium\n\n* Cisco WebEx Connect IM Cross-Site Scripting Vulnerability.\tCVE-2018-0276\n* Cisco Unified Communications Manager LDAP Information Disclosure Vulnerability.\tCVE-2018-0267\n* Cisco Unified Communications Manager HTTP Interface Information Disclosure Vulnerability.\tCVE-2018-0266\n* Cisco StarOS IPsec Manager Denial of Service Vulnerability.\tCVE-2018-0273\n* Cisco Packet Data Network Gateway Peer-to-Peer Message Processing Denial of Service Vulnerability.\tCVE-2018-0256\n* Cisco Identity Services Engine Shell Access Vulnerability.\tCVE-2018-0275\n* Cisco Industrial Ethernet Switches Device Manager Cross-Site Request Forgery Vulnerability.\tCVE-2018-0255\n* Cisco Firepower System Software Intelligent Application Bypass Vulnerability.\tCVE-2018-0254\n* Cisco Firepower System Software Server Message Block File Policy Bypass Vulnerability.\tCVE-2018-0243\n* Cisco Firepower System Software Server Message Block File Policy Bypass Vulnerability. CVE-2018-0244\n* Cisco Firepower Threat Defense SSL Engine High CPU Denial of Service Vulnerability.\tCVE-2018-0272\n* Cisco DNA Center Cross Origin Resource Sharing Vulnerability.\tCVE-2018-0269\n* Cisco cBR Series Converged Broadband Routers High CPU Usage Denial of Service Vulnerability.\tCVE-2018-0257\n* Cisco Adaptive Security Appliance Clientless SSL VPN Cross-Site Scripting Vulnerability.\tCVE-2018-0251\n* Cisco Adaptive Security Appliance WebVPN Cross-Site Scripting Vulnerability.\tCVE-2018-0242\n* Cisco AMP for Endpoints macOS Connector DMG File Malware Bypass Vulnerability.\tCVE-2018-0237\n* Cisco MATE Live Directory Information Disclosure Vulnerability.\tCVE-2018-0260\n* Cisco MATE Collector Cross-Site Request Forgery Vulnerability.\tCVE-2018-0259\n\n# Products Affected\n\nDue to the fact that multiple products are affected, below you will find only products families. For details please consult Cisco Security Advisories and Alerts web site [1].\n\n* Cisco devices that are running a vulnerable release of Cisco IOS or IOS XE Software and have the Smart Install client feature enabled.\n* Cisco Adaptive Security Appliance\n* Cisco AMP for Endpoints\n* Cisco ASA Software, FTD Software, and AnyConnect Secure Mobility Client\n* Cisco cBR Series Converged Broadband Routers\n* Cisco DNA Center\n* Cisco Firepower System Software\n* Cisco Firepower Threat Defense SSL Engine\n* Cisco Identity Services Engine\n* Cisco Industrial Ethernet Switches Device Manager\n* Cisco IOS XR Software\n* Cisco MATE Collector\n* Cisco MATE Live Directory\n* Cisco Packet Data Network Gateway\n* Cisco StarOS\n* Cisco UCS Director Virtual Machine\n* Cisco Unified Communications Manager\n* Cisco WebEx Clients\n* Cisco WebEx Connect IM\n\n# Recommendations\n\nUpgrade products based on Cisco recommendations [1].\n\n## Workarounds\n\nDue to the large number of products affected please consult the specific vulnerable product workaround if any [1].\n\n# References\n\n[1] <https://tools.cisco.com/security/center/publicationListing.x>\n\n[2] <https://www.us-cert.gov/ncas/current-activity/2018/04/18/Cisco-Releases-Security-Updates-Multiple-Products>\n\n[3] <https://www.hkcert.org/mobile_url/en/alert/18041902>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>19/04/2018 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On the 17th and 18th of April 2018, Cisco has released several updates to address vulnerabilities [1] affecting multiple products in which a remote attacker can exploit these vulnerabilities to trigger cross site scripting, denial of service, remote code execution, security restriction bypass and sensitive information disclosure on the targeted system.</p><h2 id=\"technical-details\">Technical Details</h2><p>Vulnerabilities impact [1, 2] is presented below.</p><h5 id=\"critical\">Critical</h5><ul><li>Cisco WebEx Clients Remote Code Execution Vulnerability. CVE-2018-0112</li><li>Cisco UCS Director Virtual Machine Information Disclosure Vulnerability for End User Portal. CVE-2018-0238</li><li>Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability. CVE-2018-0171</li></ul><h5 id=\"high\">High</h5><ul><li>Cisco IOS and IOS XE Software Smart Install Denial of Service Vulnerability. CVE-2018-0156</li><li>Cisco StarOS Interface Forwarding Denial of Service Vulnerability. CVE-2018-0239</li><li>Cisco IOS XR Software UDP Broadcast Forwarding Denial of Service Vulnerability. CVE-2018-0241</li><li>Cisco Firepower Detection Engine Secure Sockets Layer Denial of Service Vulnerability. CVE-2018-0233</li><li>Cisco Firepower 2100 Series Security Appliances IP Fragmentation Denial of Service Vulnerability. CVE-2018-0230</li><li>Cisco ASA Software, FTD Software, and AnyConnect Secure Mobility Client SAML Authentication Session Fixation Vulnerability. CVE-2018-0229</li><li>Cisco Adaptive Security Appliance Application Layer Protocol Inspection Denial of Service Vulnerabilities. CVE-2018-0240</li><li>Cisco Adaptive Security Appliance TLS Denial of Service Vulnerability. CVE-2018-0231</li><li>Cisco Adaptive Security Appliance Flow Creation Denial of Service Vulnerability. CVE-2018-0228</li><li>Cisco Adaptive Security Appliance Virtual Private Network SSL Client Certificate Bypass Vulnerability. CVE-2018-0227</li></ul><h5 id=\"medium\">Medium</h5><ul><li>Cisco WebEx Connect IM Cross-Site Scripting Vulnerability. CVE-2018-0276</li><li>Cisco Unified Communications Manager LDAP Information Disclosure Vulnerability. CVE-2018-0267</li><li>Cisco Unified Communications Manager HTTP Interface Information Disclosure Vulnerability. CVE-2018-0266</li><li>Cisco StarOS IPsec Manager Denial of Service Vulnerability. CVE-2018-0273</li><li>Cisco Packet Data Network Gateway Peer-to-Peer Message Processing Denial of Service Vulnerability. CVE-2018-0256</li><li>Cisco Identity Services Engine Shell Access Vulnerability. CVE-2018-0275</li><li>Cisco Industrial Ethernet Switches Device Manager Cross-Site Request Forgery Vulnerability. CVE-2018-0255</li><li>Cisco Firepower System Software Intelligent Application Bypass Vulnerability. CVE-2018-0254</li><li>Cisco Firepower System Software Server Message Block File Policy Bypass Vulnerability. CVE-2018-0243</li><li>Cisco Firepower System Software Server Message Block File Policy Bypass Vulnerability. CVE-2018-0244</li><li>Cisco Firepower Threat Defense SSL Engine High CPU Denial of Service Vulnerability. CVE-2018-0272</li><li>Cisco DNA Center Cross Origin Resource Sharing Vulnerability. CVE-2018-0269</li><li>Cisco cBR Series Converged Broadband Routers High CPU Usage Denial of Service Vulnerability. CVE-2018-0257</li><li>Cisco Adaptive Security Appliance Clientless SSL VPN Cross-Site Scripting Vulnerability. CVE-2018-0251</li><li>Cisco Adaptive Security Appliance WebVPN Cross-Site Scripting Vulnerability. CVE-2018-0242</li><li>Cisco AMP for Endpoints macOS Connector DMG File Malware Bypass Vulnerability. CVE-2018-0237</li><li>Cisco MATE Live Directory Information Disclosure Vulnerability. CVE-2018-0260</li><li>Cisco MATE Collector Cross-Site Request Forgery Vulnerability. CVE-2018-0259</li></ul><h2 id=\"products-affected\">Products Affected</h2><p>Due to the fact that multiple products are affected, below you will find only products families. For details please consult Cisco Security Advisories and Alerts web site [1].</p><ul><li>Cisco devices that are running a vulnerable release of Cisco IOS or IOS XE Software and have the Smart Install client feature enabled.</li><li>Cisco Adaptive Security Appliance</li><li>Cisco AMP for Endpoints</li><li>Cisco ASA Software, FTD Software, and AnyConnect Secure Mobility Client</li><li>Cisco cBR Series Converged Broadband Routers</li><li>Cisco DNA Center</li><li>Cisco Firepower System Software</li><li>Cisco Firepower Threat Defense SSL Engine</li><li>Cisco Identity Services Engine</li><li>Cisco Industrial Ethernet Switches Device Manager</li><li>Cisco IOS XR Software</li><li>Cisco MATE Collector</li><li>Cisco MATE Live Directory</li><li>Cisco Packet Data Network Gateway</li><li>Cisco StarOS</li><li>Cisco UCS Director Virtual Machine</li><li>Cisco Unified Communications Manager</li><li>Cisco WebEx Clients</li><li>Cisco WebEx Connect IM</li></ul><h2 id=\"recommendations\">Recommendations</h2><p>Upgrade products based on Cisco recommendations [1].</p><h3 id=\"workarounds\">Workarounds</h3><p>Due to the large number of products affected please consult the specific vulnerable product workaround if any [1].</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://tools.cisco.com/security/center/publicationListing.x\">https://tools.cisco.com/security/center/publicationListing.x</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.us-cert.gov/ncas/current-activity/2018/04/18/Cisco-Releases-Security-Updates-Multiple-Products\">https://www.us-cert.gov/ncas/current-activity/2018/04/18/Cisco-Releases-Security-Updates-Multiple-Products</a></p><p>[3] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.hkcert.org/mobile_url/en/alert/18041902\">https://www.hkcert.org/mobile_url/en/alert/18041902</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}