Cisco releases a critical security patch for a virtualized automation tool

Security hole in Cisco Elastic Services Controller gets a 10 out of 10 vulnerability rating

digital security concept > lock / keyhole / circuits / network connections
Zapp2Photo / Getty Images

Cisco has released a  patch for a critical vulnerability in software used to control large virtual environments.

The weakness gets a 10 out of 10 severity score and is found in Cisco’s Elastic Services Controller (ESC), which the company describes as offering a single point of control to manage all aspects of Virtual Network Functions and offers capabilities such as VM and service monitoring, auto-recovery and dynamic scaling. With ESC users control the lifecycle all virtualized resources, whether using Cisco or third-party VNFs, Cisco stated.

The vulnerability in this case lies in the REST API of ESC and could let  an unauthenticated remote attacker to bypass authentication on the REST API and execute arbitrary actions through with administrative privileges on an affected system. The vulnerability is due to improper validation of API requests, Cisco wrote in its advisory.

This vulnerability affects Cisco ESC running Software Release 4.1, 4.2, 4.3 or 4.4 when the REST API is enabled. The REST API is not enabled by default, Cisco noted.  The vulnerability is fixed in Cisco Elastic Services Controller Release 4.5.

Cisco said the susceptibility was found during internal security testing and the company is not aware of any public announcements or malicious use of the vulnerability.

Cisco has released free software updates that address this vulnerability and suggests going here for the fix.

This announcement was Cisco’s second “critical” patch

To continue reading this article register now