AV:N/AC:M/Au:S/C:C/I:N/A:P/E:F/RL:OF/RC:C
-
A vulnerability in the configuration of the XML parser of Cisco Prime Service Catalog could allow an authenticated, remote attacker to access sensitive data stored on the host operating system or cause system resource consumption that could cause a denial of service condition.
Cisco has released software updates that address this vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-psc-xmlee
-
A vulnerability in the configuration of the XML parser of Cisco Prime Service Catalog could allow an authenticated, remote attacker to access sensitive data or cause system resource consumption that could cause a denial of service (DoS) condition.
The vulnerability is due to improper handling of XML external entities. An attacker could exploit this vulnerability by submitting crafted HTTP requests to the Prime Service Catalog Simple Object Access Protocol (SOAP) based web services. To complete a successful attack, the attacker also needs a server that is reachable from the Cisco Prime Service Catalog. A successful exploit could allow the attacker to access data stored on the host operating system, consume system resources, or cause a DoS condition. The disclosed data could contain sensitive information, which may include private keys and passwords.
This vulnerability is documented in Cisco bug ID CSCup92880 (registered customers only) and has been assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2015-0581
Given the characteristics of this vulnerability, Cisco recommends customers generate new public/private key pairs, obtain a new certificate for that key pair, and install the new certificate and associated key pair as appropriate on all affected deployments after installing the software updates. Cisco also recommends changing the passwords for access to the host operating system and policy orchestration integration.
-
There are no mitigations that can be performed manually on the affected system.
-
When considering software upgrades, customers are advised to consult the Cisco Security Advisories, Responses, and Notices archive at http://www.cisco.com/go/psirt and review subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Cisco has released Prime Service Catalog 10.1 as well as a patch for 9.4.1, 9.4.1R2, 10.0, and 10.0R2 to remediate the vulnerability described in this document.Software Download
Cisco Prime Service Catalog Software can be downloaded from the Software Center on Cisco.com by visiting http://www.cisco.com/cisco/software/navigator.html
Products > Cloud and Systems Management > Cloud Management > Intelligent Automation for Cloud > Intelligent Automation for Cloud 3.1 > Prime Service Catalog Patches
Ensure you select the appropriate platform, Windows or Linux, and download the xFire hot fix for Prime Service Catalog versions 9.4.1, 9.4.1 R2, 10.0, and 10.0R2.
-
The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
The vulnerability described in this advisory has been found during internal tests or during the resolution of support cases. The vulnerability was also independently discovered and reported to Cisco by Alexios Dimitriadis.
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
-
Revision 1.0 2015-January-28 Initial public release.
-
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.