|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Cisco ASA-CX, Prime Security Manager: privilege escalation via the password changing function
Synthesis of the vulnerability
An attacker can define the password of any user of of Cisco ASA and Prime Security Manager, in order to escalate his privileges.
Impacted software: ASA, Cisco PRSM.
Severity of this computer vulnerability: 3/4.
Consequences of an attack: administrator access/rights, privileged access/rights.
Attacker's origin: internet client.
Creation date: 04/02/2016.
Références of this announce: CERTFR-2016-AVI-047, cisco-sa-20160203-prsm, CVE-2016-1301, VIGILANCE-VUL-18868.
Description of the vulnerability
The products Cisco ASA and Prime Security Manager manage user accounts the password of which may be defined with a web service.
However, the code that implements the password changing function does not fully check the HTTP request, and some requests allow any user to define the password of any user, including the one for administrative accounts.
An attacker can therefore define the password of any user of of Cisco ASA and Prime Security Manager, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a network vulnerability note. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.