{"id":6483,"date":"2017-02-02T12:31:35","date_gmt":"2017-02-02T20:31:35","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/02\/news-312\/"},"modified":"2017-02-02T12:31:35","modified_gmt":"2017-02-02T20:31:35","slug":"news-312","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/02\/news-312\/","title":{"rendered":"Cisco patches critical flaw in Prime Home device management server"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt0.staticworld.net\/images\/article\/2016\/11\/20151005-cisco-hq-sign-100620823-orig-100696107-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lucian Constantin | Date: Thu, 02 Feb 2017 12:08:00 -0800<\/strong><\/p>\n<p> Cisco Systems has fixed a critical vulnerability that could allow hackers to take over servers used by telecommunications providers to remotely manage customer equipment such as routers. <\/p>\n<p> The vulnerability affects Cisco Prime Home, an automated configuration server (ACS) that communicates with subscriber devices using the TR-069 protocol. In addition to remotely managing customer equipment, it can also &#8220;automatically activate and configure subscribers and deliver advanced services via service packages&#8221; over mobile, fiber, cable, and other ISP networks. <\/p>\n<p> &#8220;A vulnerability in the web-based GUI of Cisco Prime Home could allow an unauthenticated, remote attacker to bypass authentication and execute actions with administrator privileges,&#8221; Cisco said in <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20170201-prime-home\" target=\"_blank\">its advisory<\/a>. <\/p>\n<p> Attackers could exploit the vulnerability by sending API commands over HTTP to a particular URL without requiring authentication. The flaw is caused by a processing error in the role-based access control of URLs, Cisco explained. <\/p>\n<p> In the past, security researchers found vulnerabilities in the TR-069 implementation of many routers that could have allowed hackers to remotely take over those devices. However, a vulnerability in an ACS like Cisco Prime Home is much worse, because it can be used to take control of entire groups of subscriber devices at once. <\/p>\n<p> According to Cisco&#8217;s <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/net_mgmt\/prime\/home\/5-1\/user\/guide\/cisco_prime_home_5-1_user_guide\/prime_home_5-1_ug_ch1_intro.html\" target=\"_blank\">documentation<\/a>, the admin role on the Cisco Prime Home has access to the server&#8217;s customer support, administration, and audit functions, as well as the ability to perform bulk operations and access utilities and reports. <\/p>\n<p> The vulnerability affects Cisco Prime Home versions 6.3.0.0 and above. Customers are advised to migrate to the latest, fixed version: 6.5.0.1. <\/p>\n<p> The company has also <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20170201-psc\" target=\"_blank\">warned customers<\/a> of a medium-risk URL redirect vulnerability in the Cisco Prime Service Catalog, a product that allows companies to set up self-service portals, provide IT service catalogs for data center and application services, and manage service requests. <\/p>\n<p> An attacker could exploit the vulnerability to redirect a user logged into the Cisco Prime Service Catalog to a phishing site in order to steal their credentials. <\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3164830\/security\/cisco-patches-critical-flaw-in-prime-home-device-management-server.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt0.staticworld.net\/images\/article\/2016\/11\/20151005-cisco-hq-sign-100620823-orig-100696107-large.3x2.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p> Cisco Systems has fixed a critical vulnerability that could allow hackers to take over servers used by telecommunications providers to remotely manage customer equipment such as routers.<\/p>\n<p> The vulnerability affects Cisco Prime Home, an automated configuration server (ACS) that communicates with subscriber devices using the TR-069 protocol. In addition to remotely managing customer equipment, it can also &#8220;automatically activate and configure subscribers and deliver advanced services via service packages&#8221; over mobile, fiber, cable, and other ISP networks.<\/p>\n<p> &#8220;A vulnerability in the web-based GUI of Cisco Prime Home could allow an unauthenticated, remote attacker to bypass authentication and execute actions with administrator privileges,&#8221; Cisco said in <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20170201-prime-home\" target=\"_blank\">its advisory<\/a>.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3164830\/security\/cisco-patches-critical-flaw-in-prime-home-device-management-server.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11080,714],"class_list":["post-6483","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-networking","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6483"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6483\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6483"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}