Cisco Issues Security Updates for Critical Vulnerabilities in Its Products

February 26, 2021

Cisco has released a critical security patch for a severe vulnerability in its Application Centric Infrastructure (ACI) Multi-Site Orchestrator (MSO). This flaw potentially enables unauthenticated remote attackers to bypass authentication on compromised devices. According to a recent advisory from the company, “An attacker could exploit this vulnerability by sending a crafted request to the affected API.” A successful exploit could allow the attacker to obtain a token with administrator-level privileges, enabling authentication to the affected MSO and Cisco Application Policy Infrastructure Controller (APIC) devices. Identified as CVE-2021-1388, this vulnerability scores a 10 (out of 10) on the CVSS vulnerability scale and arises from improper token validation in an API endpoint of the Cisco ACI MSO installed on the Application Services Engine. It impacts ACI MSO versions running on the 3.0 software release. The ACI Multi-Site Orchestrator enables customers to monitor and manage their network infrastructure effectively.

Cisco Issues Critical Security Fixes for Major Vulnerabilities in Its Products

February 26, 2021

Cisco has announced the release of security patches addressing a vulnerability of maximum severity within its Application Centric Infrastructure (ACI) Multi-Site Orchestrator (MSO). This flaw could allow an unauthenticated remote attacker to bypass authentication on affected devices, raising significant concerns for users of this technology. In an advisory published recently, Cisco explained that exploitation of this vulnerability could occur via a specially crafted request directed at the affected API. Successfully executing such an attack could grant the intruder a token with administrator-level privileges, facilitating unauthorized access to the API on both the affected MSO and associated Cisco Application Policy Infrastructure Controller (APIC) devices.

The vulnerability, which has been assigned the identifier CVE-2021-1388, has received a critical rating of 10 on the Common Vulnerability Scoring System (CVSS). This assessment underscores the potential risk it poses to users. The underlying issue relates to improper token validation within an API endpoint of the Cisco ACI MSO, specifically affecting installations running version 3.0 of the software.

Organizations utilizing Cisco’s ACI Multi-Site Orchestrator should prioritize the immediate installation of the provided updates to mitigate the risks associated with this vulnerability. Given that the ACI MSO is designed to enable customers to oversee and coordinate network operations across multiple sites, any compromises in its security can lead to dire consequences, including unauthorized access to sensitive data.

In terms of potential attack methods, this incident aligns with tactics outlined in the MITRE ATT&CK Matrix, specifically those associated with initial access and privilege escalation. With the ability to bypass authentication, an assailant could gain an initial foothold in the target environment, leading to further exploits that enhance their control over the infrastructure. The improper validation of tokens not only facilitates the entry point for attacks but may also enable ongoing unauthorized actions within the system.

As this situation unfolds, business owners in the technology sector are advised to maintain vigilance and ensure that their security protocols are up to date. It is essential to understand that vulnerabilities like CVE-2021-1388 can serve as entry points for sophisticated cyber-attackers, underscoring the importance of robust cybersecurity measures. In an era where digital threats are increasingly prevalent, proactive risk management strategies can make a crucial difference in safeguarding sensitive business assets against potential exploitation.

Source link