Multiple vulnerabilities in Cisco Routed Passive Optical Network (PON) Controller Software



Published: 2024-09-13
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2024-20483
CVE-2024-20489
CWE-ID CWE-78
CWE-312
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Routed Passive Optical Network (PON) Controller Software
Other software / Other software solutions

NCS 540-24Q8L2DD-SYS Router
Hardware solutions / Routers & switches, VoIP, GSM, etc

NCS 540-24Z8Q2C-SYS Router
Hardware solutions / Routers & switches, VoIP, GSM, etc

NCS 540-28Z4C-SYS-A Router
Hardware solutions / Routers & switches, VoIP, GSM, etc

NCS 540-28Z4C-SYS-D Router
Hardware solutions / Routers & switches, VoIP, GSM, etc

NCS 540-ACC-SYS Router
Hardware solutions / Routers & switches, VoIP, GSM, etc

NCS 540X-16Z4G8Q2C-A Router
Hardware solutions / Routers & switches, VoIP, GSM, etc

NCS 540X-16Z4G8Q2C-D Router
Hardware solutions / Routers & switches, VoIP, GSM, etc

NCS 55A1-24Q6H-SS
Hardware solutions / Routers & switches, VoIP, GSM, etc

NCS 55A2-MOD-SE-S
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Network Convergence System NCS-57C1-48Q6-SYS
Hardware solutions / Routers & switches, VoIP, GSM, etc

NCS 57C3-MOD
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) OS Command Injection

EUVDB-ID: #VU97229

Risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-20483

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote administrator can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Routed Passive Optical Network (PON) Controller Software: 24.1 - 24.3

NCS 540-24Q8L2DD-SYS Router : All versions

NCS 540-24Z8Q2C-SYS Router : All versions

NCS 540-28Z4C-SYS-A Router : All versions

NCS 540-28Z4C-SYS-D Router : All versions

NCS 540-ACC-SYS Router : All versions

NCS 540X-16Z4G8Q2C-A Router : All versions

NCS 540X-16Z4G8Q2C-D Router : All versions

NCS 55A1-24Q6H-SS: All versions

NCS 55A2-MOD-SE-S: All versions

Cisco Network Convergence System NCS-57C1-48Q6-SYS: All versions

NCS 57C3-MOD: All versions

CPE2.3 External links

http://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ponctlr-ci-OHcHmsFL


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Cleartext storage of sensitive information

EUVDB-ID: #VU97231

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-20489

CWE-ID: CWE-312 - Cleartext Storage of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to improper storage of the unencrypted database credentials on the device. A local user can access the configuration files and view MongoDB credentials.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Routed Passive Optical Network (PON) Controller Software: 24.1 - 24.3

NCS 540-24Q8L2DD-SYS Router : All versions

NCS 540-24Z8Q2C-SYS Router : All versions

NCS 540-28Z4C-SYS-A Router : All versions

NCS 540-28Z4C-SYS-D Router : All versions

NCS 540-ACC-SYS Router : All versions

NCS 540X-16Z4G8Q2C-A Router : All versions

NCS 540X-16Z4G8Q2C-D Router : All versions

NCS 55A1-24Q6H-SS: All versions

NCS 55A2-MOD-SE-S: All versions

Cisco Network Convergence System NCS-57C1-48Q6-SYS: All versions

NCS 57C3-MOD: All versions

CPE2.3 External links

http://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ponctlr-ci-OHcHmsFL


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###