Menu
Cisco issues critical security warning for IOS XE REST API container

Cisco issues critical security warning for IOS XE REST API container

This Cisco IOS XE REST API vulnerability could lead to attackers obtaining the token-id of an authenticated user

Credit: 16507878 © Gavril Margittai Dreamstime.com

Cisco has issued a software update to address a vulnerability in its Cisco REST API virtual service container for Cisco IOS XE software that scored a critical 10 out of 10 on the Common Vulnerability Scoring System (CVSS) system.

With the vulnerability an attacker could submit malicious HTTP requests to the targeted device and if successful, obtain the token-id of an authenticated user.

This token-id could be used to bypass authentication and execute privileged actions through the interface of the REST API virtual service container on the affected Cisco IOS XE device, the company said.

According to Cisco the REST API is an application that runs in a virtual services container. A virtual services container is a virtualised environment on a device and is delivered as an open virtual application (OVA). The OVA package has to be installed and enabled on a device through the device virtualisation manager (VMAN) CLI.

The Cisco REST API provides a set of RESTful APIs as an alternative method to the Cisco IOS XE CLI to provision selected functions on Cisco devices.

Cisco said the vulnerability can be exploited under the following conditions:

  • The device runs an affected Cisco IOS XE Software release
  • The device has installed and enabled an affected version of the Cisco REST API virtual service container
  • An authorised user with administrator credentials (level 15) is authenticated to the REST API interface

The REST API interface is not enabled by default. To be vulnerable, the virtual services container must be installed and activated. Deleting the OVA package from the device storage memory removes the attack vector.

If the Cisco REST API virtual service container is not enabled, this operation will not impact the device's normal operating conditions, Cisco stated.

This vulnerability affects Cisco devices that are configured to use a vulnerable version of Cisco REST API virtual service container. This vulnerability affected the following products:

  • Cisco 4000 Series Integrated Services Routers
  • Cisco ASR 1000 Series Aggregation Services Routers
  • Cisco Cloud Services Router 1000V Series
  • Cisco Integrated Services Virtual Router

Cisco said it has released a fixed version of the REST API virtual service container and a hardened IOS XE release that prevents installation or activation of a vulnerable container on a device.

If the device was already configured with an active vulnerable container, the IOS XE software upgrade will deactivate the container, making the device not vulnerable.

In that case, to restore the REST API functionality, customers should upgrade the Cisco REST API virtual service container to a fixed software release, the company said.


Tags cisco

Brand Post

Show Comments