CVE-2019-12643 Cisco REST API Container for IOS XE Software Authentication Bypass Vulnerability (Aug 2019)

Preface: Because a stateless API can increase request overhead by handling large loads of incoming and outbound calls, a REST API should be designed to encourage the storage of cacheable data.

Vulnerability details: A vulnerability in the Cisco REST API virtual service container for Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass authentication on the managed Cisco IOS XE device.

Fundamental design weakness of REST API authentication. For example:

  1. Make POST request to /api/rest/issues, get it working with an API key
  2. Perhaps there is no way to disable the Auth layer
  3. Generating an auth key
  4. Now you have an auth-token for app
  5. cURL GET request (with Authentication)
  6. cURL POST request (with Authentication)
  7. ………

What can Cisco customers do? As follows:

Official announcement by vendorhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-iosxe-rest-auth-bypass

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.