On May 16, 2018, Cisco publicly released information on three vulnerabilities with CVSS scores of 10. The three vulnerabilities, CVE-2018-0222 1, CVE-2018-0268 2 and CVE-2018-0271 3, affect Cisco Digital Network Architecture Center. These vulnerabilities are remotely exploitable and do not require authentication. At the time of publishing, exploitation of these vulnerabilities have not been actively seen by eSentire. Due to the ease of potential exploitation, security patches should be applied as soon as a business impact review is conducted.

What we're doing about it

  • The eSentire Threat Intelligence team is actively monitoring the situation for changes and additional details

What you should do about it

  • After conducting a business impact review, apply Cisco security patches

Additional information

CVE-2018-0222 affects all versions of Cisco Digital Network Architecture Center prior to version 1.1.3. Static default credentials in the software may allow a threat actor to log into a system and execute commands with root privileges.

CVE-2018-0268 affects all versions of Cisco Digital Network Architecture Center prior to version 1.1.4. A threat actor that has the ability to access the Kubernetes service port may execute commands with escalated privilege and compromise all affected containers. 

CVE-2018-0271 affects versions prior to 1.1.2 of Cisco Digital Network Architecture Center. A failure to normalize URLs prior to servicing requests allows a threat actor to submit a specially crafted URL to gain access to critical services and potential elevate privileges in the Digital Network Architecture Center.

[1] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dnac

[2] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dna

[3] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180516-dna2

eSentire Media Contact

Ready to start the conversation?

Let's Talk