-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2022.1617.2
         Cisco IOx Application Hosting Environment Vulnerabilities
                                13 May 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco IOx Application Hosting Environment
Publisher:         Cisco Systems
Operating System:  Cisco
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-20727 CVE-2022-20726 CVE-2022-20725
                   CVE-2022-20724 CVE-2022-20723 CVE-2022-20722
                   CVE-2022-20721 CVE-2022-20720 CVE-2022-20719
                   CVE-2022-20718 CVE-2022-20677 

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj

Comment: CVSS (Max):  5.5 CVE-2022-20719 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N)
         CVSS Source: Cisco Systems
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N

Revision History:  May   13 2022: Removed individual product IDs from Fixed Software for Cisco IOS XE devices. Updated fixed release information for IR510 WPAN Industrial Router. 
                   April 14 2022: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco IOx Application Hosting Environment Vulnerabilities

Priority:        Medium
Advisory ID:     cisco-sa-iox-yuXQ6hFj
First Published: 2022 April 13 16:00 GMT
Last Updated:    2022 May 12 15:50 GMT
Version 1.1:     Final
Workarounds:     No workarounds available
Cisco Bug IDs:   CSCvx27640 CSCvy16608 CSCvy30903 CSCvy30957 CSCvy35913
                 CSCvy35914 CSCvy86583 CSCvy86598 CSCvy86602 CSCvy86603
                 CSCvy86604 CSCvy86608
CVE Names:       CVE-2022-20677 CVE-2022-20718 CVE-2022-20719 CVE-2022-20720
                 CVE-2022-20721 CVE-2022-20722 CVE-2022-20723 CVE-2022-20724
                 CVE-2022-20725 CVE-2022-20726 CVE-2022-20727
CWEs:            CWE-22 CWE-250 CWE-77

Summary

  o Multiple vulnerabilities in the Cisco IOx application hosting environment
    on multiple Cisco platforms could allow an attacker to inject arbitrary
    commands into the underlying host operating system, execute arbitrary code
    on the underlying host operating system, install applications without being
    authenticated, or conduct a cross-site scripting (XSS) attack against a
    user of the affected software.

    For more information about these vulnerabilities, see the Details section
    of this advisory.

    Cisco has released software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj

    This advisory is part of the April 2022 release of the Cisco IOS and IOS XE
    Software Security Advisory Bundled Publication. For a complete list of the
    advisories and links to them, see Cisco Event Response: April 2022
    Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled
    Publication.

Affected Products

  o Vulnerable Products

    At the time of publication, one of more of these vulnerabilities affected
    the following Cisco products if they were running a vulnerable software
    release:

       800 Series Industrial Integrated Services Routers (Industrial ISRs)
       800 Series Integrated Services Routers (ISRs)
       1000 Series Connected Grid Router (CGR1000) Compute Modules
       IC3000 Industrial Compute Gateways
       Industrial Ethernet (IE) 4000 Series Switches
       IOS XE-based devices configured with IOx
       IR510 WPAN Industrial Routers

    For information about which Cisco software releases were vulnerable at the
    time of publication, see the Fixed Software section of this advisory. See
    the Details section in the bug ID(s) at the top of this advisory for the
    most complete and current information.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by these vulnerabilities.

    Cisco has confirmed that these vulnerabilities do not affect the following
    Cisco products:

       IOS XR Software
       Meraki products
       NX-OS Software

Details

  o The vulnerabilities are not dependent on one another. Exploitation of one
    of the vulnerabilities is not required to exploit another vulnerability. In
    addition, a software release that is affected by one of the vulnerabilities
    may not be affected by the other vulnerabilities.

    Details about the vulnerabilities are as follows:

    CVE-2022-20718: Cisco IOx Application Hosting Environment Parameter
    Injection Vulnerability

    A vulnerability in the Cisco IOx application hosting environment of
    multiple Cisco platforms could allow an authenticated, remote attacker to
    execute a parameter injection using the Cisco IOx API.

    This vulnerability is due to incomplete sanitization of parameters that are
    passed in for activation of an application. An attacker could exploit this
    vulnerability by deploying and activating an application in the Cisco IOx
    application hosting environment with a crafted activation payload file. A
    successful exploit could allow the attacker to execute arbitrary code as
    root on the underlying host operating system.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvy35913
    CVE ID: CVE-2022-20718
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 5.5
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N

    CVE-2022-20719: Cisco IOx Application Hosting Environment Parameter
    Injection Vulnerability

    A vulnerability in the Cisco IOx application hosting environment of
    multiple Cisco platforms could allow an authenticated, remote attacker to
    execute a parameter injection using the Cisco IOx API.

    This vulnerability is due to incomplete sanitization of parameters that are
    passed in as part of the IOx package descriptor. An attacker could exploit
    this vulnerability by crafting an IOx package descriptor file and then
    building and deploying an application in the Cisco IOx application hosting
    environment. A successful exploit could allow the attacker to execute
    arbitrary code as root on the underlying host operating system.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvy86583
    CVE ID: CVE-2022-20719
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 5.5
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N

    CVE-2022-20720: Cisco IOx Application Hosting Environment Path Traversal
    Vulnerability

    A vulnerability in the Cisco IOx application hosting environment of
    multiple Cisco platforms could allow an authenticated, remote attacker to
    read or write arbitrary data on the underlying host operating system.

    This vulnerability exists because a real path check is not performed on the
    requested data. An attacker could exploit this vulnerability by creating a
    symbolic link within the deployed application and requesting data using the
    API. A successful exploit could allow the attacker to read or execute
    arbitrary code as root on the underlying host operating system.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvy30957
    CVE ID: CVE-2022-20720
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 5.5
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N

    CVE-2022-20723: Cisco IOx Application Hosting Environment Arbitrary Code
    Execution Vulnerability

    A vulnerability in the Cisco IOx application hosting environment of
    multiple Cisco platforms could allow an authenticated, remote attacker to
    execute arbitrary code on the underlying host operating system.

    This vulnerability is due to incomplete sanitization of parameters that are
    passed in for activation of an application. An attacker could exploit this
    vulnerability by deploying and activating an application in the Cisco IOx
    application hosting environment with a crafted activation payload file. A
    successful exploit could allow the attacker to execute arbitrary code as
    root on the underlying host operating system.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvy86603
    CVE ID: CVE-2022-20723
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 5.5
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N

    CVE-2022-20725: Cisco IOx Application Hosting Environment Cross-Site
    Scripting Vulnerability

    A vulnerability in the web-based Local Manager interface of the Cisco IOx
    application hosting environment could allow an authenticated, remote
    attacker to conduct a stored cross-site scripting (XSS) attack against a
    user of the web-based Local Manager interface of an affected device. The
    attacker must have valid Local Manager credentials.

    This vulnerability is due to insufficient validation of user-supplied input
    by the web-based Local Manager interface. An attacker could exploit this
    vulnerability by injecting malicious code into a system settings tab. A
    successful exploit could allow the attacker to execute arbitrary script
    code in the context of the affected web interface or allow the attacker to
    access sensitive browser-based information.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvy86608
    CVE ID: CVE-2022-20725
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 5.5
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N

    CVE-2022-20724: Cisco IOx Application Hosting Environment User
    Impersonation Vulnerability

    A vulnerability in the Cisco IOx application hosting environment of
    multiple Cisco platforms could allow an unauthenticated, remote attacker to
    bypass authentication and impersonate another authenticated user session.

    This vulnerability is due to a race condition for allocation of the token.
    An attacker could exploit this vulnerability by constantly trying a call to
    the upload API, and if the calls occur at the same time as an authorized
    administrator deploying an application, the attacker may race the token and
    be given the ability to bypass authentication. A successful exploit could
    allow the attacker to bypass authentication.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvy86604
    CVE ID: CVE-2022-20724
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 5.3
    CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

    CVE-2022-20726: Cisco IOx Application Hosting Environment Denial of Service
    Vulnerability

    A vulnerability in the Cisco IOx application hosting environment of Cisco
    809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829
    Industrial ISRs, Cisco CGR 1000 Compute Modules, and Cisco IC3000
    Industrial Compute Gateways could allow an unauthenticated, remote attacker
    to cause a denial of service (DoS) condition on an affected device.

    This vulnerability is due to insufficient error handling of socket
    operations. An attacker could exploit this vulnerability by sending a
    sustained rate of crated TCP traffic to the IOx web server on an affected
    device. A successful exploit could allow the attacker to cause the IOx web
    server to stop processing requests, resulting in a DoS condition.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvx27640
    CVE ID: CVE-2022-20726
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 5.3
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

    CVE-2022-20677: Cisco IOS XE Software Privilege Escalation Vulnerability

    A vulnerability in the Cisco IOx application hosting environment in Cisco
    IOS XE Software could allow an authenticated, local attacker to elevate
    privileges from privilege level 15 to root on an affected device.

    This vulnerability is due to incomplete file protection for the Cisco IOx
    application hosting environment. An attacker could exploit this
    vulnerability by modifying the file system with a crafted payload. A
    successful exploit could allow the attacker to execute arbitrary commands
    as root .

    Bug ID(s): CSCvy30903 CSCvy16608
    CVE ID: CVE-2022-20677
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 5.1
    CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N

    CVE-2022-20727: Cisco IOx Application Hosting Environment Privilege
    Escalation

    A vulnerability in the Cisco IOx application hosting environment of
    multiple Cisco platforms could allow an authenticated, local attacker to
    gain escalated privileges.

    This vulnerability is due to improper input validation when loading Cisco
    IOx applications. An attacker could exploit this vulnerability by modifying
    application content while a Cisco IOx application is loading. A successful
    exploit could allow the attacker to gain privileges equivalent to the root 
    user.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvy35914
    CVE ID: CVE-2022-20727
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 5.1
    CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N

    CVE-2022-20721: Cisco IOx Application Hosting Environment Arbitrary File
    Read Vulnerability

    A vulnerability in the Cisco IOx application hosting environment of
    multiple Cisco platforms could allow an authenticated, remote attacker to
    read arbitrary files from the underlying operating system.

    This vulnerability is due to insufficient path validation of command
    arguments within the Cisco IOx API. An attacker could exploit this
    vulnerability by sending a crafted command request using the API. A
    successful exploit could allow the attacker to read the contents of any
    file that is located on the host device filesystem.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvy86598
    CVE ID: CVE-2022-20721
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 4.9
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

    CVE-2022-20722: Cisco IOx Application Hosting Environment Path Traversal
    Vulnerability

    A vulnerability in the Cisco IOx application hosting environment of
    multiple Cisco platforms could allow an authenticated, remote attacker to
    read arbitrary files from the underlying host filesystem.

    This vulnerability is due to insufficient path validation of command
    arguments within the Cisco IOx API. An attacker could exploit this
    vulnerability by sending a crafted command request using the API. A
    successful exploit could allow the attacker to read the contents of any
    file that is located on the underlying host filesystem.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    Bug ID(s): CSCvy86602
    CVE ID: CVE-2022-20722
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 4.9
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Workarounds

  o There are no workarounds that address these vulnerabilities. However, there
    is a mitigation.

    Customers who do not want to use the Cisco IOx application hosting
    environment can disable IOx permanently on the device by using the no iox 
    configuration command.

    While this mitigation has been deployed and was proven successful in a test
    environment, customers should determine the applicability and effectiveness
    in their own environment and under their own use conditions. Customers
    should be aware that any workaround or mitigation that is implemented may
    negatively impact the functionality or performance of their network based
    on intrinsic customer deployment scenarios and limitations. Customers
    should not deploy any workarounds or mitigations before first evaluating
    the applicability to their own environment and any impact to such
    environment.

Fixed Software

  o When considering software upgrades , customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories page , to determine exposure and a complete
    upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Fixed Releases

    At the time of publication, the release information in the following table
    (s) was accurate. See the Details section in the bug ID(s) at the top of
    this advisory for the most complete and current information.

    Cisco Platform           First Fixed Release
    800 Series Industrial    Cisco IOS Software Release 15.9(3)M5 and later.
    ISRs
    800 Series ISRs          Not fixed; IOx has reached end of life on Cisco
                             800 Series ISRs.
    CGR1000 Compute Modules  IOx image for CGR1000 Compute Module 1.15.0.1
    IC3000 Industrial        Industrial Compute Gateway Software Release 1.4.1
    Compute Gateways
    IE 4000 Series Switches  Not fixed; IOx has reached end of life on the
                             Cisco IE 4000 Series Switches.
                             Cisco IOS XE Software releases:

                               o 16.12(7) (All but CSCvy16608 are resolved in
                                 16.12(6))
    IOS XE-based devices       o 17.3(5)
    configured with IOx        o 17.6(2)
                               o 17.7(1) and later

                             For more information, see the Cisco IOS and IOS XE
                             Software Checker section below.
    IR510 WPAN Industrial    IR510 Operating System 6.5.9
    Routers

    The Cisco Product Security Incident Response Team (PSIRT) validates only
    the affected and fixed release information that is documented in this
    advisory.

    Cisco IOS and IOS XE Software

    To help customers determine their exposure to vulnerabilities in Cisco IOS
    and IOS XE Software, Cisco provides the Cisco Software Checker to identify
    any Cisco Security Advisories that impact a specific software release and
    the earliest release that fixes the vulnerabilities described in each
    advisory ("First Fixed"). If applicable, the tool also returns the earliest
    release that fixes all the vulnerabilities described in all the advisories
    identified ("Combined First Fixed").

    Customers can use the Cisco Software Checker to search advisories in the
    following ways:

       Choose the software and one or more releases
       Upload a .txt file that includes a list of specific releases
       Enter the output of the show version command

    After initiating a search, customers can customize the search to include
    all Cisco Security Advisories, a specific advisory, or all advisories in
    the most recent bundled publication.

    Customers can also use the following form to determine whether a release is
    affected by any Cisco Security Advisory by entering a Cisco IOS or IOS XE
    Software release-for example, 15.1(4)M2 or 3.13.8S :

    [                    ] [Check]

    By default, the Cisco Software Checker includes results only for
    vulnerabilities that have a Critical or High Security Impact Rating (SIR).
    To include results for Medium SIR vulnerabilities, customers can use the
    Cisco Software Checker on Cisco.com and check the Medium check box in the
    drop-down list under Impact Rating when customizing a search.

Exploitation and Public Announcements

  o The Cisco PSIRT is not aware of any public announcements or malicious use
    of the vulnerabilities that are described in this advisory.

Source

  o Cisco would like to thank Cyrille CHATRAS of Orange group for reporting the
    following vulnerabilities: CVE-2022-20718, CVE-2022-20719, CVE-2022-20720,
    CVE-2022-20721, CVE-2022-20722, CVE-2022-20723, CVE-2022-20724,
    CVE-2022-20725.

    CVE-2022-20718 and CVE-2022-20720: These vulnerabilities were also found
    during internal security testing by X.B. of the Cisco Advanced Security
    Initiatives Group (ASIG).

    CVE-2022-20677: This vulnerability was found during internal security
    testing by X.B. of the Cisco ASIG.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy . This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Related to This Advisory

  o Cisco Event Response: April 2022 Semiannual Cisco IOS and IOS XE Software
    Security Advisory Bundled Publication
    Cross-Site Scripting

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj

Revision History

  o +---------+-----------------------------+----------+--------+-------------+
    | Version |         Description         | Section  | Status |    Date     |
    +---------+-----------------------------+----------+--------+-------------+
    |         | Removed individual product  |          |        |             |
    |         | IDs from Fixed Software for |          |        |             |
    | 1.1     | Cisco IOS XE devices.       | Fixed    | Final  | 2022-MAY-12 |
    |         | Updated fixed release       | Software |        |             |
    |         | information for IR510 WPAN  |          |        |             |
    |         | Industrial Router.          |          |        |             |
    +---------+-----------------------------+----------+--------+-------------+
    | 1.0     | Initial public release.     | -        | Final  | 2022-APR-13 |
    +---------+-----------------------------+----------+--------+-------------+

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=a8fD
-----END PGP SIGNATURE-----