Menu
Cisco releases security patches to mitigate attack against Unified Communications Manager

Cisco releases security patches to mitigate attack against Unified Communications Manager

The company addressed some of the vulnerabilities used in a publicly demonstrated attack, but not all of them

Cisco Systems released a security patch for its Unified Communications Manager (Unified CM) enterprise telephony product in order to mitigate an attack that could allow hackers to take full control of the systems. The company also patched denial-of-service vulnerabilities in its Intrusion Prevention System software.

The Cisco Unified CM is a call processing component that extends enterprise telephony features and functions to IP phones, media processing devices, VoIP gateways, and multimedia applications, according to Cisco.

At the beginning of June, researchers from a French security consultancy firm called Lexfo publicly demonstrated an attack that chained together multiple "blind" SQL injection, command injection and privilege escalation vulnerabilities in order to compromise a Cisco Unified CM server.

The demonstration also revealed that all versions of Cisco Unified CM use a static hard-coded encryption key to encrypt sensitive data stored in the server's database, including user credentials.

"The initial blind SQL injection allows an unauthenticated, remote attacker to use the hard-coded encryption key to obtain and decrypt a local user account. This allows for a subsequent, authenticated blind SQL injection," Cisco said Wednesday in a security advisory.

"Successful exploitation of the command injection and privilege escalation vulnerabilities could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system with elevated privileges," the company said.

Cisco has released a security patch in the form of a Cisco Options Package (COP) called "cmterm-CSCuh01051-2.cop.sgn" that addresses some of the vulnerabilities used in the attack, including the one allowing the initial blind SQL injection.

Customers can download the file from Cisco's website and install it as a temporary solution until the company releases new and patched versions of the Unified CM software.

The COP file mitigates the initial attack vector and reduces the documented attack surface, Cisco said. However, some other vulnerabilities used in the attack remain unpatched.

The remaining vulnerabilities are still being investigated and no workarounds are available for them yet, the company said.

Versions 7.1.x, 8.5.x, 8.6.x, 9.0.x and 9.1.x of the Cisco Unified CM are affected by the publicly demonstrated attack. Version 8.0 is also affected, but is no longer supported. Customers using this version are advised to contact Cisco for assistance in upgrading to a supported version.

The company is also investigating the possibility that some of its other voice products are affected by one or more of the individual vulnerabilities used in the attack. These products are the Cisco Emergency Responder, Cisco Unified Contact Center Express, Cisco Unified Customer Voice Portal, Cisco Unified Presence Server/Cisco IM and Presence Service and Cisco Unity Connection.

On Wednesday, Cisco also advised customers about several denial-of-service vulnerabilities affecting the software running on some of its Intrusion Prevention System (IPS) products.

Products affects by one or several of those vulnerabilities are the Cisco ASA 5500-X Series IPS Security Services Processor (IPS SSP) software and hardware modules; Cisco IPS 4500 Series Sensors; Cisco IPS 4300 Series Sensors; the Cisco IPS Network Module Enhanced (NME) and the Cisco Catalyst 6500 Series Intrusion Detection System (IDSM-2) Module.

The company has released patched versions of the Cisco IPS Software for those products, except for the Cisco IDSM-2. A workaround for the vulnerability affecting Cisco IDSM-2 was made available.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags securityvoiptelecommunicationtelephonyintrusionCisco SystemspatchesExploits / vulnerabilitiesDetection / preventionLexfo

Featured

Slideshows

Meet the leading female front runners of the Kiwi channel

Meet the leading female front runners of the Kiwi channel

Reseller News honoured the leading female front runners of the New Zealand channel at the 2018 Women in ICT Awards (WIICTA) in Auckland. The awards honoured standout individuals across seven categories, spanning Entrepreneur; Innovation; Rising Star; Shining Star; Community; Technical and Achievement.

Meet the leading female front runners of the Kiwi channel
Meet the top performing customer-centric Microsoft channel partners

Meet the top performing customer-centric Microsoft channel partners

Microsoft honoured leading partners across the channel following a year of customer innovation and market growth in New Zealand. The 2018 Microsoft Partner Awards recognised excellence within the context of the end-user, spanning a host of emerging and established providers.

Meet the top performing customer-centric Microsoft channel partners
Reseller News launches new-look Awards at 2018 Judges’ Lunch

Reseller News launches new-look Awards at 2018 Judges’ Lunch

Introducing the Reseller News Innovation Awards, launched to the channel at the 2018 Judges’ Lunch in Auckland. With more than 70 judges now part of the voting panel, the new-look awards will reflect the changing dynamics of the channel, recognising excellence across customer value and innovation - spanning start-ups, partners, distributors and vendors.

Reseller News launches new-look Awards at 2018 Judges’ Lunch
Show Comments