Cisco Systems Inc. is urging customers to update affected routers quickly after the discovery and disclosure of a severe vulnerability on devices running its IOS XE operating system.
CVE-2019-12643, as it’s known, ranked as a 10 out 10 for severity. The vulnerability in the Cisco REST API virtual service container for Cisco IOS XE, revealed Wednesday, can allow an attacker to bypass authentication on a managed Cisco IOS XE device.
The vulnerability is said to be the result of an improper check performed in an area of code that manages the REST API authentication service. It affects Cisco 400 Series Integrated Services Routers, Cisco ASR 1000 Series Aggregation Service Routers, Cisco Cloud Services Router 1000V Series and Cisco Integrated Services Virtual Router.
“The critical authentication bypass flaw in Cisco IOS XE could be exploited by an unauthenticated, remote attacker sending specially crafted HTTP requests to a vulnerable device, resulting in the exposure of an authenticated users’ token-id,” Scott Caveza, research engineering manager at cyber exposure firm Tenable Inc., told SiliconANGLE.
“While the flaw is critical, it’s important to note there are a number of requirements for successful exploitation, including the device has both installed and enabled an affected version of the Cisco REST API virtual service container,” Ceveza explained. “In addition, a user must be logged into the device in order to obtain the token I.D.”
Chetan Conikee, chief technology officer of appsec automation company ShiftLeft Inc., noted that “the flaw is a reminder that application security needs to extend to every piece of code that exists in an organization’s network.
“API dependencies serve an important purpose, in that they enable each development organization to focus on the code for which they add the most value and leverage the innovation of other organizations by leveraging their APIs,” he said. “But by integrating the API into your application, you also inherit its vulnerabilities.”
Cisco has released iosxe-remote-mgmt.16.03.03.ova, a updated version of the virtual service container, as well as added additional safeguards in updated IOS XE versions. The updates are available to licensed users only.
Image: Cisco
Since you’re here …
… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.