Thursday, January 30, 2025
HomeNetwork SecurityCritical Vulnerability in Cisco Elastic Services Controller Let Hackers Take Full Control...

Critical Vulnerability in Cisco Elastic Services Controller Let Hackers Take Full Control of the System Remotely

Published on

SIEM as a Service

Follow Us on Google News

Cisco released a new security update with the fixes for a critical vulnerability that resides in the Cisco Elastic Services Controller REST API let attackers full control of the system remotely.

Cisco Elastic Services Controller is a virtual network functions manager, which enables businesses to automate the deployment and monitoring of functions running on their virtual environments.

This critical vulnerability affected the Cisco Elastic Services Controller running Software Release 4.1, 4.2, 4.3, or 4.4 when REST API is enabled and it’s disabled by default.

Vulnerability main affected the Cisco Elastic Controller due to the improper validation API requests.

A successful exploit of this vulnerability let an attacker execute arbitrary actions through the REST API with administrative privileges on an affected system.

You can check the table that determines the vulnerable version of
Cisco Elastic Services Controller and this vulnerability is fixed in Cisco Elastic Services Controller Release 4.5, According to the Cisco report.

Cisco Elastic Services Controller Major ReleaseSoftware Releases with Available Patch
Prior to 4.1
Not vulnerable
4.14.1.0.100
4.1.0.111
4.24.2.0.74
4.2.0.86
4.34.3.0.121
4.3.0.128
4.3.0.134
4.3.0.135
4.44.4.0.80
4.4.0.82
4.4.0.86
4.5Not vulnerable

Check Whether the REST API Is Enabled

Administrators can check whether the REST API is enabled or not by
by running the following command on the ESC virtual machine

sudo netstat -tlnup | grep '8443|8080'

Once the command will be successfully executed, The following example shows the output of the command for a machine that has the REST API service enabled on port 8443.

~/# sudo netstat -tlnup | grep '8443|8080'
.
.
.
tcp6  0  0 :::8443        :::*  LISTEN 2557/java 

This vulnerability was found during internal security testing. CVE-2019-1867 is assigned for this vulnerability.

Also Read:

Cisco Fixed Routers Vulnerabilities that Allows Hackers to Run Remote Code with Root Access

Hackers Exploiting More than 9000 Cisco RV320/RV325 Routers After POC published in GitHub

Unpatched Critical Flaw in Cisco Small Business Switches Allows Attackers to Bypass User Authentication

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

10,000 WordPress Websites Hacked to Distributing MacOS and Microsoft Malware

Over 10,000 WordPress websites have been hijacked to deliver malicious software targeting both macOS...

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

CISA Released A Free Guide to Enhance OT Product Security

To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security...

NFS Protocol Security Bypassed To Access Files From Remote Server

The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs,...

Hackers Exploiting PLC Controllers In US Water Management System To Gain Remote Access

A joint Cybersecurity Advisory (CSA) warns of ongoing exploitation attempts by Iranian Islamic Revolutionary...