A vulnerability has been discovered in NETCONF Access Management (NACM) in which access privileges are not being properly enforced.
On affected products, both privileged and unprivileged users have access to the RESTCONF interface. After passing authentication, the enforcement of access privileges is managed by NACM. Due to an implementation error, access privilege enforcement in NACM is not working properly.
The YANG object model accessible via the RESTCONF interface offers some privileged operations that allow the execution of arbitrary commands that run as root on the Linux shell. Because of this vulnerability, an authenticated unprivileged user can run these privileged operations and thus execute arbitrary commands as root.
Mitigating Factors & Recommended Actions
|Product Family||Mitigating Factors||Recommended Actions|
|Installations that have not added any unprivileged users are not exploitable.||Disable or remove any unprivileged accounts.|
|Upgrade to PMAA 1.6.4 once released.|
- Revision A (2019-01-07): Initial Release