Security Experts:

Cisco Fixes Critical Flaws in Ultra, Elastic Services Products

Cisco has released updates for its Ultra Services Framework and Elastic Services Controller products to address several vulnerabilities rated critical and high severity.

Security advisories published by the company on Wednesday describe two critical and two high severity flaws affecting the Ultra Services Platform, a software-defined mobility framework designed for mobile network operators.

The vulnerabilities affect components such as the staging server, the Ultra Automation Service (UAS), and the AutoVNF tool in releases prior to 5.0.3 and 5.1.

A remote, unauthenticated attacker can exploit the staging server bug to execute arbitrary shell commands as the Linux root user. The UAS flaw, caused by a configuration problem related to the Apache ZooKeeper service, can be exploited to gain unauthorized access to a targeted device.

“An attacker could exploit this vulnerability by accessing the affected device through the orchestrator network. An exploit could allow the attacker to gain access to ZooKeeper data nodes (znodes) and influence the behavior of the system's high-availability feature,” Cisco said in its advisory.

The high severity flaws can be exploited to obtain admin credentials for Cisco Elastic Services Controller and Cisco OpenStack installations, and read sensitive data.

In the case of Elastic Services Controller (ESC), a cloud and systems management product, Cisco released versions 2.3.1.434 and 2.3.2 to patch a critical unauthorized access vulnerability caused by default static credentials, and a high severity command execution flaw.

Each of these security holes were discovered by Cisco itself and there is no evidence of exploitation in the wild. Nevertheless, users have been advised to install the updates as workarounds are not available for these issues.

The vulnerabilities have been assigned the following CVE identifiers: CVE-2017-6714, CVE-2017-6711, CVE-2017-6709, CVE-2017-6708, CVE-2017-6713 and CVE-2017-6712.

Cisco has also warned customers of a high severity command injection vulnerability in the CLI command-parsing code of the StarOS operating system running on ASR devices. Exploiting this vulnerability requires local access and authentication on the targeted system.

Related: Cisco Patches CIA Zero-Day Affecting Hundreds of Switches

Related: Cisco Patches Critical Flaw in Small Business Router

Related: Default Account, Debug Tool Expose Cisco Prime Users to Attacks

view counter
Eduard Kovacs is an international correspondent for SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.