Policy Suite Cisco Policy Suite

Do you want an email whenever new security vulnerabilities are reported in Cisco Policy Suite?

Recent Cisco Policy Suite Security Advisories

Advisory Title Published
2021-11-03 Cisco Policy Suite Static SSH Keys Vulnerability November 3, 2021

By the Year

In 2024 there have been 0 vulnerabilities in Cisco Policy Suite . Policy Suite did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 1 9.80
2020 0 0.00
2019 0 0.00
2018 4 9.23

It may take a day or so for new Policy Suite vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Cisco Policy Suite Security Vulnerabilities

A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could

CVE-2021-40119 9.8 - Critical - November 04, 2021

A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system as the root user. This vulnerability is due to the re-use of static SSH keys across installations. An attacker could exploit this vulnerability by extracting a key from a system under their control. A successful exploit could allow the attacker to log in to an affected system as the root user.

Use of Hard-coded Credentials

A vulnerability in the Cluster Manager of Cisco Policy Suite before 18.2.0 could

CVE-2018-0375 9.8 - Critical - July 18, 2018

A vulnerability in the Cluster Manager of Cisco Policy Suite before 18.2.0 could allow an unauthenticated, remote attacker to log in to an affected system using the root account, which has default, static user credentials. The vulnerability is due to the presence of undocumented, static user credentials for the root account. An attacker could exploit this vulnerability by using the account to log in to an affected system. An exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user. Cisco Bug IDs: CSCvh02680.

Use of Hard-coded Credentials

A vulnerability in the Policy Builder interface of Cisco Policy Suite before 18.2.0 could

CVE-2018-0376 9.8 - Critical - July 18, 2018

A vulnerability in the Policy Builder interface of Cisco Policy Suite before 18.2.0 could allow an unauthenticated, remote attacker to access the Policy Builder interface. The vulnerability is due to a lack of authentication. An attacker could exploit this vulnerability by accessing the Policy Builder interface. A successful exploit could allow the attacker to make changes to existing repositories and create new repositories. Cisco Bug IDs: CSCvi35109.

Missing Authentication for Critical Function

A vulnerability in the Open Systems Gateway initiative (OSGi) interface of Cisco Policy Suite before 18.1.0 could

CVE-2018-0377 9.8 - Critical - July 18, 2018

A vulnerability in the Open Systems Gateway initiative (OSGi) interface of Cisco Policy Suite before 18.1.0 could allow an unauthenticated, remote attacker to directly connect to the OSGi interface. The vulnerability is due to a lack of authentication. An attacker could exploit this vulnerability by directly connecting to the OSGi interface. An exploit could allow the attacker to access or change any files that are accessible by the OSGi process. Cisco Bug IDs: CSCvh18017.

Missing Authentication for Critical Function

A vulnerability in the Policy and Charging Rules Function (PCRF) of the Cisco Policy Suite (CPS) could

CVE-2018-0089 7.5 - High - January 18, 2018

A vulnerability in the Policy and Charging Rules Function (PCRF) of the Cisco Policy Suite (CPS) could allow an unauthenticated, remote attacker to access sensitive data. The attacker could use this information to conduct additional reconnaissance attacks. The attacker would also have to have access to the internal VLAN where CPS is deployed. The vulnerability is due to incorrect permissions of certain system files and not sufficiently protecting sensitive data that is at rest. An attacker could exploit the vulnerability by using certain tools available on the internal network interface to request and view system files. An exploit could allow the attacker to find out sensitive information about the application. Cisco Bug IDs: CSCvf77666.

Incorrect Permission Assignment for Critical Resource

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Cisco Policy Suite or by Cisco? Click the Watch button to subscribe.

Cisco
Vendor

subscribe