Two vulnerabilities in Cisco Prime Collaboration Provisioning



Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2017-6756
CVE-2017-6759
CWE-ID CWE-352
CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Cisco Prime Collaboration Provisioning
Server applications / Other server solutions

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Cross-site request forgery

EUVDB-ID: #VU7671

Risk: Low

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2017-6756

CWE-ID: CWE-352 - Cross-Site Request Forgery (CSRF)

Exploit availability: No

Description

The vulnerability allows a remote unauthenticated attacker to perform CSRF attack.

The weakness exists due to a lack of defense against cross-site request forgery (CSRF) attacks. A remote attacker can create a specially crafted HTML page or URL, trick the victim into visiting it, gain access to the system and perform arbitrary actions.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Cisco Prime Collaboration Provisioning: 12.1

CPE2.3 External links

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-pcpt1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper input validation

EUVDB-ID: #VU7672

Risk: Medium

CVSSv4.0: 5.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N/E:U/U:Green]

CVE-ID: CVE-2017-6759

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote authenticated attacker to write arbitrary files on the system.

The weakness exists in the UpgradeManager of the Cisco Prime Collaboration Provisioning Tool due to insufficient validation of user-supplied input. A remote attacker can trigger the upgrade package installation functionality and write arbitrary files as root on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Cisco Prime Collaboration Provisioning: 12.1

CPE2.3 External links

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170802-pcpt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###