Operating System:

[Cisco]

Published:

10 February 2023

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2022.1444.9
  Vulnerability in Spring Framework Affecting Cisco Products: March 2022
                             10 February 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Endpoint Clients and Client Software
                   Network Management and Provisioning
                   Voice and Unified Communications Devices
                   Routing and Switching - Enterprise and Service Provider
                   Video, Streaming, TelePresence, and Transcoding Devices
Publisher:         Cisco Systems
Operating System:  Cisco
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-22965  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67

Revision History:  February 10 2023: Vendor updated advisory url and products confirmed not vulnerable
                   June      2 2022: Vendor updated fixed releases information
                   May       3 2022: Vendor updated vulnerable and not vulnerable products
                   April    14 2022: Vendor updated vulnerable products
                   April    13 2022: Updated the products under investigation, vulnerable products, and products confirmed not vulnerable.
                   April     8 2022: Vendor updated vulnerable products and released patch for Cisco CX Cloud Agent Software
                   April     6 2022: Vendor updated vulnerable products
                   April     5 2022: Title update
                   April     5 2022: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Vulnerability in Spring Framework Affecting Cisco Products: March 2022

Priority:        Critical
Advisory ID:     cisco-sa-java-spring-rce-Zx9GUc67
First Published: 2022 April 1 23:45 GMT
Last Updated:    2023 February 9 15:14 GMT
Version 1.13:    Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvv65984 CSCwa79849 CSCwb43327 CSCwb43328 CSCwb43331
                 CSCwb43332 CSCwb43335 CSCwb43340 CSCwb43342 CSCwb43345
                 CSCwb43346 CSCwb43734 CSCwb43736 CSCwb43738 CSCwb43739
                 CSCwb44794 CSCwb69766 CSCwb70105 CSCwb84370 CSCwc96587
                 CSCwd75689
CVE Names:       CVE-2022-22965

CVSS Score:
9.8  AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X

Summary

  o On March 31, 2022, the following critical vulnerability in the Spring
    Framework affecting Spring MVC and Spring WebFlux applications running on
    JDK 9+ was released:

    CVE-2022-22965: Spring Framework RCE via Data Binding on JDK 9+

    For a description of this vulnerability, see VMware Spring Framework
    Security Vulnerability Report .

    This advisory is available at the following link:
    https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67

Affected Products

  o Cisco investigated its product line to determine which products may be
    affected by this vulnerability.

    The Vulnerable Products section includes Cisco bug IDs for each affected
    product. The bugs are accessible through the Cisco Bug Search Tool and
    contain additional platform-specific information, including workarounds (if
    available) and fixed software releases.

    Any product not listed in the Affected Products section of this advisory is
    to be considered not vulnerable.

    Vulnerable Products

    Cisco investigated its product line to determine which products may be
    affected by this vulnerability.

    The following table lists Cisco products that are affected by the
    vulnerability that is described in this advisory. If a future release date
    is indicated for software, the date provided represents an estimate based
    on all information known to Cisco as of the Last Updated date at the top of
    the advisory. Availability dates are subject to change based on a number of
    factors, including satisfactory testing results and delivery of other
    priority features and fixes. Customers should refer to the associated Cisco
    bug(s) for further details.

                    Product                  Cisco Bug       Fixed Release
                                                 ID          Availability
                       Endpoint Clients and Client Software
    Cisco CX Cloud Agent Software            CSCwb41735 2.0 (Available)
                        Network Management and Provisioning
    Cisco Automated Subsea Tuning            CSCwb43658 2.1.0 (31 May 2022)
    Cisco Crosswork Network Controller       CSCwb43703 3.0.2 (Available)
                                                        2.0.2 (Available)
    Cisco Crosswork Optimization Engine      CSCwb43709 3.1.1 (Available)
                                                        2.1.1 (Available)
    Cisco Crosswork Zero Touch Provisioning  CSCwb43706 3.0.2 (Available)
    (ZTP)                                               2.0.2 (Available)
                                                        2.3.3.3 (17 Jun 2022)
    Cisco DNA Center                         CSCwb43650 2.2.3.6 (6 Jun 2022)
                                                        2.2.2.9 (6 Jun 2022)
    Cisco Evolved Programmable Network                  6.0.1.1 (Available)
    Manager                                  CSCwb43643 5.1.4.1 (Available)
                                                        5.0.2.3 (Available)
    Cisco Managed Services Accelerator (MSX) CSCwb43667 4.2.3 (Available)
    Cisco Optical Network Planner            CSCwb43691 4.2 (31 May 2022)
                                                        5.0 (30 Aug 2022)
                                                        7.5.2.1 (Available)
    Cisco WAN Automation Engine (WAE) Live   CSCwb43708 7.4.0.2 (Available)
                                                        7.3.0.3 (Available)
                                                        7.5.2.1 (Available)
    Cisco WAN Automation Engine (WAE)        CSCwb43708 7.4.0.2 (Available)
                                                        7.3.0.3 (Available)
    Data Center Network Manager (DCNM)       CSCwb43637 11.5.4 (Available)
    Nexus Dashboard Fabric Controller (NDFC) CSCwb43637 12.1.1 (30 Jun 2022)
              Routing and Switching - Enterprise and Service Provider
    Cisco Optical Network Controller         CSCwb43692 2.0 (31 May 2022)
    Cisco Software-Defined AVC (SD-AVC)      CSCwb43727 4.3.1 (30 July 2022)
                                                        4.4.0 (30 Nov 2022)
                     Voice and Unified Communications Devices
                                                        11.6 - Not vulnerable.
    Cisco Enterprise Chat and Email          CSCwb45202 12.0 (6 Jun 2022)
                                                        12.5 (6 Jun 2022)
                                                        12.6 ES2 (6 Jun 2022)
              Video, Streaming, TelePresence, and Transcoding Devices
                                                        3.5.0 (Available)
    Cisco Meeting Server                     CSCwb43662 3.4.2 (31 May 2022)
                                                        3.3.3 (17 Jun 2022)

    Products Confirmed Not Vulnerable

    Cisco investigated its product line to determine which products may be
    affected by this vulnerability.

    Any product not listed in the Affected Products section of this advisory is
    to be considered not vulnerable.

    Cisco has confirmed that this vulnerability does not affect the following
    Cisco products:

    Cable Devices

       Cisco Continuous Deployment and Automation Framework
       Cisco Prime Cable Provisioning

    Collaboration and Social Media

       Cisco SocialMiner
       Cisco Webex App, formerly Cisco Webex Teams
       Cisco Webex Meetings Server

    Network Application, Service, and Acceleration

       Cisco Wide Area Application Services (WAAS)

    Network and Content Security Devices

       Cisco Adaptive Security Appliance (ASA) Software
       Cisco Firepower Device Manager (FDM)
       Cisco Firepower Management Center (FMC) Software
       Cisco Firepower System Software
       Cisco Identity Services Engine (ISE)
       Cisco Secure Email Gateway, formerly Email Security Appliance (ESA)
       Cisco Secure Email and Web Manager, formerly Cisco Content Security
        Management Appliance (SMA)
       Cisco Secure Network Analytics, formerly Cisco Stealthwatch
       Cisco Security Manager
       Cisco Umbrella Active Directory (AD) Connector
       Cisco Umbrella Roaming Clients
       Cisco Umbrella Virtual Appliance

    Network Management and Provisioning

       Cisco Application Policy Infrastructure Controller (APIC)
       Cisco Business Process Automation
       Cisco CloudCenter Action Orchestrator
       Cisco CloudCenter Cost Optimizer
       Cisco CloudCenter Suite Admin
       Cisco CloudCenter Workload Manager
       Cisco CloudCenter
       Cisco Collaboration Audit and Assessments
       Cisco Common Services Platform Collector (CSPC)
       Cisco Connected Mobile Experiences
       Cisco Connected Pharma
       Cisco Crosswork Change Automation
       Cisco Crosswork Data Gateway
       Cisco Crosswork Network Automation
       Cisco Crosswork Situation Manager
       Cisco Elastic Services Controller (ESC)
       Cisco Extensible Network Controller (XNC)
       Cisco Intelligent Node (iNode) Manager
       Cisco IoT Field Network Director, formerly Cisco Connected Grid Network
        Management System
       Cisco NCS 2000 Shelf Virtualization Orchestrator (SVO)
       Cisco Network Change and Configuration Management
       Cisco Network Insights for Data Center
       Cisco Nexus Dashboard Data Broker, formerly Cisco Nexus Data Broker
       Cisco Nexus Dashboard, formerly Cisco Application Services Engine
       Cisco Nexus Insights
       Cisco Policy Suite for Mobile
       Cisco Policy Suite
       Cisco Prime Performance Manager
       Cisco Smart PHY
       Cisco ThousandEyes Endpoint Agent
       Cisco ThousandEyes Enterprise Agent
       Cisco Virtual Topology System - Virtual Topology Controller (VTC) VM

    Routing and Switching - Enterprise and Service Provider

       Cisco ACI HTML5 vCenter Plug-in
       Cisco ASR 5000 Series Routers
       Cisco Enterprise NFV Infrastructure Software (NFVIS)
       Cisco GGSN Gateway GPRS Support Node
       Cisco IOx Fog Director
       Cisco IP Services Gateway (IPSG)
       Cisco MME Mobility Management Entity
       Cisco Mobility Unified Reporting and Analytics System
       Cisco Network Convergence System 2000 Series
       Cisco ONS 15454 Series Multiservice Provisioning Platforms
       Cisco PDSN/HA Packet Data Serving Node and Home Agent
       Cisco PGW Packet Data Network Gateway
       Cisco SD-WAN vManage
       Cisco System Architecture Evolution Gateway (SAEGW)
       Cisco Ultra Packet Core
       Cisco Ultra Services Platform

    Routing and Switching - Small Business

       Cisco Business Dashboard

    Unified Computing

       Cisco HyperFlex

    Voice and Unified Communications Devices

       Cisco BroadWorks
       Cisco Cloud Connect
       Cisco Emergency Responder
       Cisco Packaged Contact Center Enterprise
       Cisco Unified Attendant Console Advanced
       Cisco Unified Attendant Console Business Edition
       Cisco Unified Attendant Console Department Edition
       Cisco Unified Attendant Console Enterprise Edition
       Cisco Unified Attendant Console Premium Edition
       Cisco Unified Communications Manager IM & Presence Service
       Cisco Unified Communications Manager Session Management Edition
       Cisco Unified Communications Manager
       Cisco Unified Contact Center Enterprise
       Cisco Unified Contact Center Express
       Cisco Unified Customer Voice Portal
       Cisco Unified Intelligence Center
       Cisco Unity Connection
       Cisco Virtualized Voice Browser

    Video, Streaming, TelePresence, and Transcoding Devices

       Cisco Expressway Series
       Cisco TelePresence Integrator C Series
       Cisco TelePresence MX Series
       Cisco TelePresence Management Suite Provisioning Extensions
       Cisco TelePresence Management Suite
       Cisco TelePresence Precision Cameras
       Cisco TelePresence Profile Series
       Cisco TelePresence SX Series
       Cisco TelePresence System EX Series
       Cisco TelePresence Video Communication Server (VCS)
       Cisco Touch
       Cisco Video Surveillance Operations Manager
       Cisco Vision Dynamic Signage Director
       Cisco Webex Board Series
       Cisco Webex Desk Series
       Cisco Webex Room Navigator
       Cisco Webex Room Series

    Wireless

       Cisco Ultra Cloud Core - Access and Mobility Management Function
       Cisco Ultra Cloud Core - Network Repository Function
       Cisco Ultra Cloud Core - Policy Control Function
       Cisco Ultra Cloud Core - Redundancy Configuration Manager
       Cisco Ultra Cloud Core - Session Management Function
       Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure

    Cisco Cloud Hosted Services

       Cisco BroadCloud
       Cisco Industrial Asset Vision
       Cisco IoT Control Center
       Cisco IoT Operations Dashboard (IOTOC)
       Cisco Kinetic for Cities
       Cisco Registered Envelope Service
       Cisco Smart Collector - Lifecycle Management
       Cisco Umbrella
       Cisco Unified Communications Manager Cloud
       Cisco Webex Cloud-Connected UC (CCUC)

Workarounds

  o Any workarounds will be documented in the product-specific Cisco bugs,
    which are identified in the Vulnerable Products section of this advisory.

Fixed Software

  o For information about fixed software releases, consult the Cisco bugs
    identified in the Vulnerable Products section of this advisory.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page, to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is aware that
    proof-of-concept exploit code is available for the vulnerability described
    in this advisory.

Source

  o This vulnerability was publicly disclosed by VMware on March 31, 2022.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

Action Links for This Advisory

  o Snort Rule 30790
    Snort Rule 30791
    Snort Rule 30792
    Snort Rule 30793
    Snort Rule 59416

Related to This Advisory

  o 

URL

  o https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67

Revision History

  o +---------+--------------------------+------------+---------+-------------+
    | Version |       Description        |  Section   | Status  |    Date     |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated products         | Affected   |         |             |
    | 1.13    | confirmed not            | Products   | Final   | 2023-FEB-09 |
    |         | vulnerable.              |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    | 1.12    | Updated Fixed Releases   | Vulnerable | Final   | 2022-JUN-01 |
    |         | information.             | Products   |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated vulnerable       |            |         |             |
    | 1.11    | products and products    | Affected   | Final   | 2022-APR-29 |
    |         | confirmed not            | Products   |         |             |
    |         | vulnerable.              |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the products     |            |         |             |
    |         | under investigation,     | Affected   |         |             |
    | 1.10    | vulnerable products, and | Products   | Interim | 2022-APR-26 |
    |         | products confirmed not   |            |         |             |
    |         | vulnerable.              |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the products     |            |         |             |
    |         | under investigation,     | Affected   |         |             |
    | 1.9     | vulnerable products, and | Products   | Interim | 2022-APR-21 |
    |         | products confirmed not   |            |         |             |
    |         | vulnerable.              |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the products     |            |         |             |
    |         | under investigation,     | Affected   |         |             |
    | 1.8     | vulnerable products, and | Products   | Interim | 2022-APR-14 |
    |         | products confirmed not   |            |         |             |
    |         | vulnerable.              |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the products     |            |         |             |
    |         | under investigation,     | Affected   |         |             |
    | 1.7     | vulnerable products, and | Products   | Interim | 2022-APR-13 |
    |         | products confirmed not   |            |         |             |
    |         | vulnerable.              |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the products     |            |         |             |
    |         | under investigation,     | Affected   |         |             |
    | 1.6     | vulnerable products, and | Products   | Interim | 2022-APR-12 |
    |         | products confirmed not   |            |         |             |
    |         | vulnerable.              |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the products     |            |         |             |
    |         | under investigation,     | Affected   |         |             |
    | 1.5     | vulnerable products, and | Products   | Interim | 2022-APR-11 |
    |         | products confirmed not   |            |         |             |
    |         | vulnerable.              |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the products     |            |         |             |
    |         | under investigation,     | Affected   |         |             |
    | 1.4     | vulnerable products, and | Products   | Interim | 2022-APR-07 |
    |         | products confirmed not   |            |         |             |
    |         | vulnerable.              |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the products     |            |         |             |
    |         | under investigation,     | Affected   |         |             |
    | 1.3     | vulnerable products, and | Products   | Interim | 2022-APR-06 |
    |         | products confirmed not   |            |         |             |
    |         | vulnerable.              |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the products     |            |         |             |
    |         | under investigation,     | Affected   |         |             |
    | 1.2     | vulnerable products, and | Products   | Interim | 2022-APR-05 |
    |         | products confirmed not   |            |         |             |
    |         | vulnerable.              |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    |         | Updated the products     |            |         |             |
    |         | under investigation,     | Affected   |         |             |
    | 1.1     | vulnerable products, and | Products   | Interim | 2022-APR-04 |
    |         | products confirmed not   |            |         |             |
    |         | vulnerable.              |            |         |             |
    +---------+--------------------------+------------+---------+-------------+
    | 1.0     | Initial public release.  | -          | Interim | 2022-APR-01 |
    +---------+--------------------------+------------+---------+-------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=hKjF
-----END PGP SIGNATURE-----