ID

VAR-201706-0554


CVE

CVE-2017-6639


TITLE

Cisco Prime Data Center Network Manager Vulnerability to access important information in the role-based access control function

Trust: 0.8

sources: JVNDB: JVNDB-2017-004718

DESCRIPTION

A vulnerability in the role-based access control (RBAC) functionality of Cisco Prime Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to access sensitive information or execute arbitrary code with root privileges on an affected system. The vulnerability is due to the lack of authentication and authorization mechanisms for a debugging tool that was inadvertently enabled in the affected software. An attacker could exploit this vulnerability by remotely connecting to the debugging tool via TCP. A successful exploit could allow the attacker to access sensitive information about the affected software or execute arbitrary code with root privileges on the affected system. This vulnerability affects Cisco Prime Data Center Network Manager (DCNM) Software Releases 10.1(1) and 10.1(2) for Microsoft Windows, Linux, and Virtual Appliance platforms. Cisco Bug IDs: CSCvd09961. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesb3p03762en_us SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: hpesb3p03762en_us Version: 1 HPESB3P03762 rev.1 - HPE C Switch Software using Cisco Prime Data Center Network Manager (DCNM), Remote Code Execution NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. The affected versions of DCNM are 10.1(1) and 10.1(2). References: - CVE-2017-6639 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - HP C-series Switch Software Data Center Network Manager Version 10.1(1), 10.1(2) BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2017-6639 10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION There are no workarounds that address this vulnerability. Cisco has released software updates that address this vulnerability with DCNM 10.2(1). HPE has made the updates available to customers under contract through HPE Support Center: * <http://www.hpe.com/support/hpesc> **It is essential that all HPE customers who had previously downloaded any of the firmware and DCNM packages above download again with the updated packages from the HPE Support Center.** All packages have been updated to include DCNM 10.2(1), and they are listed here: * MDS 7.3(0)DY(1), released June 2017 * MDS 7.3(1)DY(1), released June 2017 * Nexus 5.2(1)N1(9b), released June 2017 HISTORY Version:1 (rev.1) - 11 August 2017 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAEBCAAGBQJZjL4yAAoJELXhAxt7SZaiac4IAIDr4QnvkSMG3dtIfdJm+crg RCz+V5mdDBRzcB2PpOtwp1xoTpDYmSa7hLAsASPE3C4V2UroizRZQa0v5lx6Qpej EVTkkLuVyNIUnN2Bg/Cm3vMNrTjwvzCeP6JJmyBcht5qJXN+TwqTO5Ie2EuUomGA UjguaR7b3jv5AxsYymXbCA/iJDHW9hOXqWjqstSnFEJYnYVWhdqv8qTyCAaCegnG iAa3yHYtbJHUcrPa3HGO7hkXueow9Nsnfx13Lh6GTvo0/6fSDUP9fVSEGynk+RD6 ss0SQ+IthBKWDmiwOshH2cJ9HNPkBRrmQ7OlW/9tjUDHWyTttD4/4f5pD16PzeA= =ElxI -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2017-6639 // JVNDB: JVNDB-2017-004718 // BID: 98935 // VULHUB: VHN-114842 // PACKETSTORM: 143703

AFFECTED PRODUCTS

vendor:ciscomodel:prime data center network managerscope:eqversion:10.1.0

Trust: 1.6

vendor:ciscomodel:prime data center network managerscope:eqversion:10.1\(1\)

Trust: 1.6

vendor:ciscomodel:prime data center network managerscope:eqversion:10.1\(2\)

Trust: 1.6

vendor:ciscomodel:prime data center network managerscope:eqversion:10.1(2)

Trust: 1.1

vendor:ciscomodel:prime data center network managerscope:eqversion:10.1(1)

Trust: 1.1

vendor:ciscomodel:mds series multilayer directorsscope:eqversion:950010.1(2)

Trust: 0.3

vendor:ciscomodel:mds series multilayer directors 10.1 stscope:eqversion:9500

Trust: 0.3

vendor:ciscomodel:mds series multilayer directors 10.1 s5scope:eqversion:9500

Trust: 0.3

vendor:ciscomodel:mds series multilayer directors 8.2 skscope:neversion:9500

Trust: 0.3

vendor:ciscomodel:mds series multilayer directors 8.1 s0scope:neversion:9500

Trust: 0.3

vendor:ciscomodel:mds series multilayer directors 10.1 s0scope:neversion:9500

Trust: 0.3

sources: BID: 98935 // JVNDB: JVNDB-2017-004718 // CNNVD: CNNVD-201706-316 // NVD: CVE-2017-6639

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6639
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-6639
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201706-316
value: CRITICAL

Trust: 0.6

VULHUB: VHN-114842
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-6639
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-114842
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6639
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-114842 // JVNDB: JVNDB-2017-004718 // CNNVD: CNNVD-201706-316 // NVD: CVE-2017-6639

PROBLEMTYPE DATA

problemtype:CWE-862

Trust: 1.1

problemtype:CWE-16

Trust: 1.0

problemtype:CWE-284

Trust: 0.9

sources: VULHUB: VHN-114842 // JVNDB: JVNDB-2017-004718 // NVD: CVE-2017-6639

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 143703 // CNNVD: CNNVD-201706-316

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201706-316

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-004718

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-114842

PATCH

title:cisco-sa-20170607-dcnm1url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm1

Trust: 0.8

title:Cisco Prime Data Center Network Manager for Microsoft Windows , Linux and Virtual Appliance Platform security vulnerability Repair measuresurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74429

Trust: 0.6

sources: JVNDB: JVNDB-2017-004718 // CNNVD: CNNVD-201706-316

EXTERNAL IDS

db:NVDid:CVE-2017-6639

Trust: 2.9

db:BIDid:98935

Trust: 2.0

db:SECTRACKid:1038626

Trust: 1.7

db:JVNDBid:JVNDB-2017-004718

Trust: 0.8

db:CNNVDid:CNNVD-201706-316

Trust: 0.7

db:PACKETSTORMid:143703

Trust: 0.2

db:VULHUBid:VHN-114842

Trust: 0.1

sources: VULHUB: VHN-114842 // BID: 98935 // JVNDB: JVNDB-2017-004718 // PACKETSTORM: 143703 // CNNVD: CNNVD-201706-316 // NVD: CVE-2017-6639

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170607-dcnm1

Trust: 2.0

url:http://www.securityfocus.com/bid/98935

Trust: 1.7

url:http://www.securitytracker.com/id/1038626

Trust: 1.7

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesb3p03762en_us

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2017-6639

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6639

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesb3p03762en_us

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesb3p03762en_us

Trust: 0.1

url:http://www.hpe.com/support/hpesc>

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.1

sources: VULHUB: VHN-114842 // BID: 98935 // JVNDB: JVNDB-2017-004718 // PACKETSTORM: 143703 // CNNVD: CNNVD-201706-316 // NVD: CVE-2017-6639

CREDITS

Antonius Mulder of Commonwealth Bank of Australia.

Trust: 0.3

sources: BID: 98935

SOURCES

db:VULHUBid:VHN-114842
db:BIDid:98935
db:JVNDBid:JVNDB-2017-004718
db:PACKETSTORMid:143703
db:CNNVDid:CNNVD-201706-316
db:NVDid:CVE-2017-6639

LAST UPDATE DATE

2024-11-23T22:01:04.835000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-114842date:2019-10-03T00:00:00
db:BIDid:98935date:2017-06-07T00:00:00
db:JVNDBid:JVNDB-2017-004718date:2017-07-05T00:00:00
db:CNNVDid:CNNVD-201706-316date:2019-10-23T00:00:00
db:NVDid:CVE-2017-6639date:2024-11-21T03:30:11.633

SOURCES RELEASE DATE

db:VULHUBid:VHN-114842date:2017-06-08T00:00:00
db:BIDid:98935date:2017-06-07T00:00:00
db:JVNDBid:JVNDB-2017-004718date:2017-07-05T00:00:00
db:PACKETSTORMid:143703date:2017-08-10T12:12:00
db:CNNVDid:CNNVD-201706-316date:2017-06-08T00:00:00
db:NVDid:CVE-2017-6639date:2017-06-08T13:29:00.453