-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.3027
      Cisco BroadWorks CommPilot Application Software Vulnerabilities
                             9 September 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco BroadWorks CommPilot Application Software
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Administrator Compromise -- Existing Account
                   Delete Arbitrary Files   -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-34786 CVE-2021-34785 

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-dJ9JT67N

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco BroadWorks CommPilot Application Software Vulnerabilities

Priority:        Medium
Advisory ID:     cisco-sa-broadworks-dJ9JT67N
First Published: 2021 September 8 16:00 GMT
Version 1.0:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvz32610 CSCvz32611
CVE Names:       CVE-2021-34785 CVE-2021-34786
CWEs:            CWE-620

Summary

  o Multiple vulnerabilities in Cisco BroadWorks CommPilot Application Software
    could allow an authenticated, remote attacker to delete arbitrary user
    accounts or gain elevated privileges on an affected system.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    For more information about these vulnerabilities, see the Details section
    of this advisory.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-dJ9JT67N

Affected Products

  o Vulnerable Products

    At the time of publication, these vulnerabilities affected Cisco BroadWorks
    CommPilot Application Software releases earlier than a fixed release if
    they implemented user access control through the web-based management
    interface to restrict access for the read-only system administrator role.

    For information about which Cisco software releases were vulnerable at the
    time of publication, see the Fixed Software section of this advisory. See
    the Details section in the bug ID(s) at the top of this advisory for the
    most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by these vulnerabilities.

Details

  o The vulnerabilities are not dependent on one another. Exploitation of one
    of the vulnerabilities is not required to exploit the other vulnerability.
    In addition, a software release that is affected by one of the
    vulnerabilities may not be affected by the other vulnerability.

    Details about the vulnerabilities are as follows:

    CVE-2021-34785: Cisco BroadWorks CommPilot Application Software Privilege
    Escalation Vulnerability

    A vulnerability in the web-based management interface of Cisco BroadWorks
    CommPilot Application Software could allow an authenticated, remote
    attacker to gain elevated privileges.

    This vulnerability is due to improper authorization checks on operations in
    the affected application. An attacker with read-only system administrator
    privileges could exploit this vulnerability by sending crafted requests to
    the application. A successful exploit could allow the attacker to modify an
    existing system administrator account and assume the privileges of the
    targeted account, resulting in privilege escalation.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvz32611
    CVE ID: CVE-2021-34785
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 6.5
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

    CVE-2021-34786: Cisco BroadWorks CommPilot Application Software Account
    Deletion Vulnerability

    A vulnerability in the web-based management interface of Cisco BroadWorks
    CommPilot Application Software could allow an authenticated, remote
    attacker to delete arbitrary user accounts.

    This vulnerability is due to improper authorization checks on operations in
    the affected application. An attacker with read-only system administrator
    privileges could exploit this vulnerability by sending crafted requests to
    the application. A successful exploit could allow the attacker to delete an
    arbitrary user account from the targeted application.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvz32610
    CVE ID: CVE-2021-34786
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 4.9
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

Workarounds

  o There are no workarounds that address these vulnerabilities.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, the release information in the following table
    (s) was accurate. See the Details section in the bug ID(s) at the top of
    this advisory for the most complete and current information.

    The left column lists Cisco software releases that were affected by the
    vulnerabilities described in this advisory. The center column indicates
    whether a patch for these vulnerabilities was released and the release
    number for the related base software. The right column lists the filename
    of the available patch.

    Cisco BroadWorks CommPilot           Release      Patch Filename
    Application Software Release         Number
    17.0                                 None         -
                                         planned.
    18.0                                 None         -
                                         planned.
    19.0                                 None         -
                                         planned.
    20.0                                 None         -
                                         planned.
    21.0                                 None         -
                                         planned.
    22.0                                 22.0.2021.09 AP.xsp.22.0.1123.ap380970
                                                      AP.as.22.0.1123.ap380970
    23.0                                 23.0.2021.09 AP.xsp.23.0.1075.ap380970
                                                      AP.as.23.0.1075.ap380970
    24.0                                 24.0.2021.09 AP.as.24.0.944.ap380970

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerabilities that are
    described in this advisory.

Source

  o Cisco would like to thank Eslam Akl for reporting these vulnerabilities.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-dJ9JT67N

Revision History

  o +----------+---------------------------+----------+--------+--------------+
    | Version  |        Description        | Section  | Status |     Date     |
    +----------+---------------------------+----------+--------+--------------+
    | 1.0      | Initial public release.   | -        | Final  | 2021-SEP-08  |
    +----------+---------------------------+----------+--------+--------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=FXbw
-----END PGP SIGNATURE-----