Cisco Security Advisory
Apache Struts Commons FileUpload Library Remote Code Execution Vulnerability Affecting Cisco Products: November 2018
-
On November 5, 2018, the Apache Struts Team released a security announcement urging an upgrade of the Commons FileUpload library to version 1.3.3 on systems using Struts 2.3.36 or earlier releases. Systems using earlier versions of this library may be exposed to attacks that could allow execution of arbitrary code or modifications of files on the system. The issue is caused by a previously reported vulnerability of the Apache Commons FileUpload library, assigned to CVE-2016-1000031.
The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by submitting crafted data to an affected system. A successful exploit could allow the attacker to execute arbitrary code or manipulate files on the targeted system.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-struts-commons-fileupload
-
Cisco investigated its product line to determine which products and services may be affected by this vulnerability.
The Vulnerable Products section of this advisory includes Cisco bug IDs for each affected product or service. The bugs are accessible through the Cisco Bug Search Tool and contain additional platform-specific information, including workarounds (if available) and fixed software releases.
Any product or service not listed in the “Vulnerable Products” section of this advisory is to be considered not vulnerable.Vulnerable Products
The following table lists Cisco products and services that are affected by the vulnerability that is described in this advisory. The software availability dates in the Fixed Release Availability column are estimates, and actual software availability may differ from the dates provided in the following table.
Product Cisco Bug ID Fixed Release Availability Collaboration and Social Media Cisco SocialMiner CSCvn22343 Patch file available for 11.5/11.6 by Dec 2018
12.0.1 (Jan 2019)Cisco Webex Meetings Server CSCvn18895 2.8MR3 Security Patch 1 (Dec 2018)
3.0MR2 Security Patch 2 (Dec 2018)Endpoint Clients and Client Software Cisco Webex Management - SuperAdmin Control Panel CSCvn18901 T33.7.2 (Dec 2018) Network and Content Security Devices Cisco Identity Services Engine (ISE) CSCvn17524 Hot patch available for 2.1 Patch 7/2.3 Patch 5
2.2 Patch 12 (Nov 2018)
2.3 Patch 6 (Feb 2019)
2.4 Patch 5 (Nov 2018)
2.5 (Dec 2018)Cisco Secure Access Control System (ACS) CSCvn18934 No fix planned 1 Network Management and Provisioning Cisco Evolved Programmable Network Manager CSCvn44132 2.2.1.2 (Dec 2018) Cisco Prime Collaboration Provisioning CSCvn18919 12.6 (Nov 2018) Cisco Prime Infrastructure CSCvn18917 3.3.1 Update 04 (Feb 2019)
3.4.1 Update 03 (Mar 2019)
3.5 (Dec 2018)Cisco Prime License Manager CSCvn18924 Patch file available for 10.5.2/11.5.1 by Dec 2018 Cisco Prime Network Registrar IP Address Manager (IPAM) CSCvn18913 No fix planned Cisco Prime Network CSCvn18910 Patch file available for 5.1 by Dec 2018
5.2 (May 2019)Cisco Prime Service Catalog CSCvn22307 12.1 v7 Patch (Dec 2018) Routing and Switching - Enterprise and Service Provider Cisco IOx Fog Director CSCvn19758 1.7.1 (Jan 2019)
1.8 (Feb 2019)Cisco IoT Field Network Director (formerly Cisco Connected Grid Network Management System) CSCvn20600 4.3.2 (Dec 2018) Voice and Unified Communications Devices Cisco Emergency Responder CSCvn18956 Patch file available for 11.5.1/12.0.1 by Dec 2018
12.5.1 (Jan 2019)Cisco Enterprise Chat and Email CSCvn18957 11.6 ES6 (Jan 2019)
12.0.1 (Jan 2019)Cisco Finesse CSCvn22344 Patch file available for 11.6 by Dec 2018
12.0.1 (Jan 2019)Cisco Hosted Collaboration Mediation Fulfillment CSCvn18961 11.5(4) (Available) Cisco Hosted Collaboration Solution for Contact Center CSCvn18962 12.0.1 (Jan 2019) Cisco MediaSense CSCvn22346 No fix planned Cisco Unified Communications Manager IM & Presence Service (formerly CUPS) CSCvn18959 Patch file available for 10.5.2/11.5.1/12.0.1 by Dec 2018
12.5.1 (Jan 2019)Cisco Unified Communications Manager CSCvn18952 Patch file available for 10.5.2/11.5.1/12.0.1 by Dec 2018
12.5.1 (Jan 2019)Cisco Unified Contact Center Enterprise CSCvn18888 12.0.1 (Jan 2019) Cisco Unified Contact Center Express CSCvn18955 Patch file available for 11.5/11.6 by Dec 2018
12.0.1 (Jan 2019)Cisco Unified E-Mail Interaction Manager CSCvn18958 No fix planned Cisco Unified Intelligence Center CSCvn18887 Patch file available for 11.5/11.6 by Dec 2018
12.0.1 (Jan 2019)Cisco Unified Intelligent Contact Management Enterprise CSCvn18888 12.0.1 (Jan 2019) Cisco Unified Web Interaction Manager CSCvn18958 No fix planned Cisco Unity Connection CSCvn18954 Patch file available for 10.5.2/11.5.1/12.0.1 by Dec 2018
12.5.1 (Jan 2019)Cisco Virtualized Voice Browser CSCvn18963 Patch file available for 11.5/11.6 by Dec 2018
12.0.1 (Jan 2019)Video, Streaming, TelePresence, and Transcoding Devices Cisco Video Distribution Suite for Internet Streaming (VDS-IS) CSCvn18928 Patch file available by Dec 2018 Wireless Cisco Mobility Services Engine CSCvn22305 Patch file available by Dec 2018 Cisco Universal Small Cell RAN Management System (USC RMS) CSCvn18939 No fix planned Cisco Cloud Hosted Services Cisco Prime Network Change and Configuration Management CSCvn19865 3.6.1 (Dec 2018)
3.7 (Mar 2019)Cisco Smart Connected Spaces CSCvn22310 Patch file available by Dec 2018 Cisco Smart Net Total Care - Contracts Information System Process Controller CSCvn18884 4.3.6 (Dec 2018) Cisco Webex Centers - Meeting Center, Training Center, Event Center, Support Center
CSCvn24113 T33.7.2 (Dec 2018)
T32.20.2 (Dec 2018)Cisco Webex Meetings CSCvn18908 Cisco will update affected systems in Dec 2018
1 Cisco Secure Access Control System (ACS) has reached the End of Software Maintenance (EoSWM) milestone. Only authenticated attackers with access to the Cisco ACS admin console could exploit this vulnerability. An administrator could also limit access to the Cisco ACS admin panel from trusted hosts in their environment.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect the following products and services:
Network Application, Service, and Acceleration
- Cisco Data Center Network Manager
Network and Content Security Devices
- Cisco Firepower Management Center
- Cisco Stealthwatch Endpoint Concentrator
- Cisco Stealthwatch FlowCollector NetFlow
- Cisco Stealthwatch FlowCollector sFlow
- Cisco Stealthwatch FlowSensor
- Cisco Stealthwatch Management Console (SMC)
- Cisco Stealthwatch UDP Director
Network Management and Provisioning
- Cisco Prime Access Registrar
- Cisco Prime Central for Service Providers
- Cisco Prime Collaboration Assurance
- Cisco Prime Collaboration Deployment
- Cisco Prime LAN Management Solution
- Cisco Prime Provisioning
- Cisco Security Manager
Routing and Switching - Enterprise and Service Provider
- Cisco Broadband Access Center for Telco and Wireless
Unified Computing
- Cisco HyperFlex System
Voice and Unified Communications Devices
- Cisco Unified Customer Voice Portal
- Cisco Unified SIP Proxy Software
- Cisco Unified Survivable Remote Site Telephony Manager
- Cisco Unity Express
Video, Streaming, TelePresence, and Transcoding Devices
- Cisco StadiumVision Director
- Cisco TelePresence Management Suite
Cisco Cloud Hosted Services
- Cisco Business Video Services Automation Software
- Cisco Cloud Web Security
- Cisco Common Services Platform Collector
- Cisco Network Device Security Assessment Service
- Cisco Network Performance Analysis
- Cisco Smart Net Total Care - On-Premises
- Cisco Smart Net Total Care
- Cisco Unified Service Delivery Platform
- Cisco Webex Network-Based Recording (NBR) Management
-
Any workarounds for a specific Cisco product or service will be documented in product-specific or service-specific Cisco bugs, which are identified in the Vulnerable Products section of this advisory.
-
For information about fixed software releases, consult the Cisco bugs identified in the Vulnerable Products section of this advisory. Questions concerning the Webex environment may be directed to the Cisco Technical Assistance Center (TAC).
When considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page, to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco TAC or their contracted maintenance providers.
-
The Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerability that is described in this advisory.
-
On November 5th, 2018, the Apache Software Foundation released a security announcement at the following link: Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
-
Version Description Section Status Date 1.17 Updated information about fixed release availability for Cisco Prime Infrastructure. The fix was not integrated in release 3.4.1 Update 02 but will be integrated in 3.4.1 Update 03. Corrected a typo referencing January 2018 instead of January 2019 as availability time for some fixed releases. Vulnerable Products Final 2019-February-07 1.16 Updated information about fixed release availability for Cisco Prime Infrastructure. The fix was not integrated in release 3.3.1 Update 03 but will be integrated in 3.3.1 Update 04. Vulnerable Products Final 2019-January-11 1.15 Updated information about fixed release availability. Removed references to ongoing investigation. Summary, Affected Products, Vulnerable Products Final 2018-December-05 1.14 Updated the lists of products under investigation, vulnerable products, and products confirmed not vulnerable. Updated information about fixed release availability. Affected Products, Vulnerable Products, Products Confirmed Not Vulnerable Interim 2018-November-30 1.13 Updated information about fixed release availability. Vulnerable Products Interim 2018-November-28 1.12 Updated information about fixed release availability. Vulnerable Products Interim 2018-November-26 1.11 Updated information about Cisco Webex Centers exposure. Updated information about fixed release availability. Vulnerable Products, Products Confirmed Not Vulnerable Interim 2018-November-22 1.10 Updated the list of vulnerable products. Updated information about fixed release availability. Vulnerable Products Interim 2018-November-21 1.9 Updated the lists of products under investigation, vulnerable products, and products confirmed not vulnerable. Updated information about fixed release availability. Affected Products, Vulnerable Products, Products Confirmed Not Vulnerable Interim 2018-November-20 1.8 Updated the lists of products under investigation, vulnerable products, and products confirmed not vulnerable. Updated information about fixed release availability. Affected Products, Vulnerable Products, Products Confirmed Not Vulnerable Interim 2018-November-19 1.7 Updated the lists of products under investigation, vulnerable products, and products confirmed not vulnerable. Affected Products, Vulnerable Products, Products Confirmed Not Vulnerable Interim 2018-November-16 1.6 Updated the lists of products under investigation, vulnerable products, and products confirmed not vulnerable. Updated information about fixed release availability. Affected Products, Vulnerable Products, Products Confirmed Not Vulnerable Interim 2018-November-15 1.5 Updated the lists of products under investigation, vulnerable products, and products confirmed not vulnerable. Updated information about fixed release availability. Affected Products, Vulnerable Products, Products Confirmed Not Vulnerable Interim 2018-November-14 1.4 Updated the lists of products under investigation, vulnerable products, and products confirmed not vulnerable. Updated information about fixed release availability. Indicated that the Cisco TAC is a resource for the Webex environment. Affected Products, Vulnerable Products, Products Confirmed Not Vulnerable, Fixed Software Interim 2018-November-13 1.3 Updated the lists of products under investigation, vulnerable products, and products confirmed not vulnerable. Updated information about fixed release availability. Affected Products, Vulnerable Products, Products Confirmed Not Vulnerable Interim 2018-November-12 1.2 Updated the lists of products under investigation, vulnerable products, and products confirmed not vulnerable. Updated information about fixed release availability. Affected Products, Vulnerable Products, Products Confirmed Not Vulnerable Interim 2018-November-09 1.1 Updated the lists of products under investigation, vulnerable products, and products confirmed not vulnerable. Affected Products, Vulnerable Products, Products Confirmed Not Vulnerable Interim 2018-November-08 1.0 Initial public release. - Interim 2018-November-07
-
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.