The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them. |
|
 |
|
|
Cisco Prime Data Center Network Manager: code execution
Synthesis of the vulnerability
An attacker can connect to the RMI service of Cisco Prime Data Center Network Manager, in order to execute code with System/root privileges. Impacted products: Cisco Prime DCNM.
Severity: 3/4.
Creation date: 31/10/2012.
Revision date: 13/05/2013.
Identifiers: BID-56348, CERTA-2012-AVI-614, cisco-sa-20121031-dcnm, CSCtz44924, CSCua31204, CVE-2012-5417, VIGILANCE-VUL-12105.
Description of the vulnerability
The Cisco Data Center Network Manager product uses a JBoss application server.
The RMI (Remote Method Invocation) service of JBoss listens on port 1099 or 9099. However, the "jboss.system:service=MainDeployer" feature is reachable by all RMI clients. An attacker can thus use this feature to deploy a service, with administrator's privileges.
An attacker can therefore connect to the RMI service of Cisco Prime Data Center Network Manager, in order to execute code with System/root privileges.
The Cisco DCNM-SAN Server and Cisco DNCM-LAN Server products are vulnerable. Complete Vigil@nce bulletin.... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides application vulnerability analysis. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The technology watch team tracks security threats targeting the computer system.
|
|