{"id":226205,"date":"2017-07-06T13:24:04","date_gmt":"2017-07-06T17:24:04","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/cisco-automation-code-needs-manual-patch-the-register.php"},"modified":"2017-07-06T13:24:04","modified_gmt":"2017-07-06T17:24:04","slug":"cisco-automation-code-needs-manual-patch-the-register","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/automation\/cisco-automation-code-needs-manual-patch-the-register.php","title":{"rendered":"Cisco automation code needs manual patch &#8211; The Register"},"content":{"rendered":"<p><p>    In Cisco's weekly security update list, there are three    critical bugs affecting its Elastic Services Controller and    Ultra Services Framework.  <\/p>\n<p>    Switchzilla     warns its Elastic Services Controller (a network function    virtualisation management environment) has static default    credentials that would let a remote attacker log into the    controller's UI.  <\/p>\n<p>    The credentials are shared between multiple installations,    meaning a miscreant could generate an admin session token that    allows access to all instances of the ESC web UI.  <\/p>\n<p>    There's also a     privilege escalation bug: user tomcat has    access to shell commands that lets that user overwrite any file    on the system, and elevate their privilege to root.  <\/p>\n<p>    The first bug in the Ultra Services Framework's (USF)    automation service has an     insecure configuration of the Apache ZooKeeper service,    which again is remotely exploitable if the attacker can get at    the orchestrator network.  <\/p>\n<p>    The framework also has a bug in its     staging server: a goof in shell invocations means an    unauthenticated remote attacker can craft CLI command inputs    to execute Linux shell commands as the root user.  <\/p>\n<p>    There's also a     credential disclosure bug in the USF's AutoVNF: it logs    admin credentials in clear text, which an attacker can retrieve    if they know the logfile's URL.  <\/p>\n<p>    The same product also has a     symbolic link error that exposes the system to arbitrary    file read and malicious code execution.   <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.theregister.co.uk\/2017\/07\/06\/cisco_automation_code_needs_manual_patch\/\" title=\"Cisco automation code needs manual patch - The Register\">Cisco automation code needs manual patch - The Register<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In Cisco's weekly security update list, there are three critical bugs affecting its Elastic Services Controller and Ultra Services Framework. Switchzilla warns its Elastic Services Controller (a network function virtualisation management environment) has static default credentials that would let a remote attacker log into the controller's UI. The credentials are shared between multiple installations, meaning a miscreant could generate an admin session token that allows access to all instances of the ESC web UI.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/automation\/cisco-automation-code-needs-manual-patch-the-register.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[431581],"tags":[],"class_list":["post-226205","post","type-post","status-publish","format-standard","hentry","category-automation"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/226205"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=226205"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/226205\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=226205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=226205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=226205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}