Cisco UCS Director Virtual Machine Information Disclosure for End User Portal

Authors:Cisco                 Risk:Critical

CVE:CVE-2018-0238            0day:Information Disclosure

0day-id:0DAY-0238             Date:2018-04-20

Summary

  • A vulnerability in the role-based resource checking functionality of the Cisco Unified Computing System (UCS) Director could allow an authenticated, remote attacker to view unauthorized information for any virtual machine in the UCS Director end-user portal and perform any permitted operations on any virtual machine. The permitted operations can be configured for the end user on the virtual machines with either of the following settings:

    • The virtual machine is associated to a Virtual Data Center (VDC) that has an end user self-service policy attached to the VDC.
    • The end user role has VM Management Actions settings configured under User Permissions. This is a global configuration, so all the virtual machines visible in the end-user portal will have the VM management actions available.

    The vulnerability is due to improper user authentication checks. An attacker could exploit this vulnerability by logging in to the UCS Director with a modified username and valid password. A successful exploit could allow the attacker to gain visibility into and perform actions against all virtual machines in the UCS Director end-user portal of the affected system.

    Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-uscd

Affected Products

  • Vulnerable Products

    This vulnerability affects Cisco Unified Computing System (UCS) Director releases 6.0 and 6.5 prior to patch 3 that are in a default configuration.

    This vulnerability can be exploited via the web interface (GUI). The Rest API interface is not affected.

    Both locally authenticated and LDAP-authenticated accounts can be used to exploit this vulnerability.

    Products Confirmed Not Vulnerable

    Although this vulnerability does not affect the Cisco Integrated Management Controller (IMC) Supervisor, the same modified login can be used. However, the login does not expose any unintended data.

    Cisco has confirmed that this vulnerability does not affect the following products:

    • Cisco Unified Computing System Director Releases prior to 6.0
    • Cisco Unified Computing System Director Express for Big Data

Details

An authenticated user who logs in to the system and exploits this vulnerability will have visibility into all virtual machines shown in the Virtual Resources menu. The actions that a user may perform against the virtual machines will depend on the actions that are permitted in either of the following:

  • The assigned end user self-service policy for the VDC in Policies > Virtual/Hypervisor Policies > Service Delivery > End User Self-Service Policy
  • The user’s role as defined in System > User Roles > User Permissions > VM Management Actions

If the UCS Director is configured in Service Provider Feature mode, an authenticated user who logs in to the system and exploits this vulnerability will have visibility into all virtual machines shown in the Virtual Resources menu, including those from other tenants.

Workarounds

There are no workarounds that address this vulnerability.

Fixed Releases

This vulnerability is fixed in the Cisco UCS Director 6.5.0.3 upgrade patch. The patch can be downloaded from the Software Center on Cisco.com by navigating to Products > Servers – Unified Computing > UCS Director > UCS Director 6.5 > UCS Director Virtual Appliance Software-6.

Source
  • This vulnerability was found during the resolution of a Cisco TAC support case

    Revision History
    • Version Description Section Status Date
      1.0 Initial public release. Final 2018-April-18

 

Leave a Reply