search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Cisco Prime Infrastructure contains SUID root binaries

Vulnerability Note VU#300820

Original Release Date: 2015-08-17 | Last Revised: 2015-08-17

Overview

The Cisco Prime Infrastructure version 2.2 contains two binaries with SUID root world-executable privileges, allowing any local user to execute arbitrary commands as root.

Description

CWE-276: Incorrect Default Permissions

Two binaries are included in Cisco Prime version 2.2 that run as SUID root with world-executable privileges. The commands are

/opt/CSCOlumos/bin/runShellCommand
/opt/CSCOlumos/bin/runShellAsRoot


These commands may be used to run arbitrary commands as root by any local user.

According to Cisco, the default installation does not create any regular users, and Cisco does not support or recommend creating regular users or utilizing the command line shell for administration. Cisco has provided more information in a security advisory (customer user account required to view).

Impact

A remote authenticated user may escalate privileges to root and execute arbitrary commands.

Solution

Apply an update

Cisco has released an update to address this issue. For more information on the update, please see Cisco's security advisory (customer user account required to view). Affected users should update as soon as possible.

You may also consider the following workaround:

Restrict executable permissions

According to the reporter, affected users may remove the world-executable permissions on runShellCommand and runShellAsRoot to disallow any local account from utilizing these binaries.

Vendor Information

300820
 

Cisco Affected

Notified:  March 16, 2015 Updated: May 08, 2015

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 9 AV:N/AC:L/Au:S/C:C/I:C/A:C
Temporal 8.5 E:H/RL:W/RC:C
Environmental 6.4 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Jeremy Brown for reporting this issue.

This document was written by Garret Wassermann.

Other Information

CVE IDs: None
Date Public: 2015-07-31
Date First Published: 2015-08-17
Date Last Updated: 2015-08-17 19:26 UTC
Document Revision: 57

Sponsored by CISA.