CVE-2018-15379

9.8 CRITICAL

📋 TL;DR

CVE-2018-15379 allows unauthenticated remote attackers to upload arbitrary files via TFTP through Cisco Prime Infrastructure's web interface due to incorrect directory permissions. This enables command execution with 'prime' user privileges (non-administrative). All Cisco Prime Infrastructure deployments with vulnerable versions are affected.

💻 Affected Systems

Products:
  • Cisco Prime Infrastructure
Versions: All versions prior to 3.4.1
Operating Systems: Linux-based appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Requires TFTP service enabled via web interface, which is accessible by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through privilege escalation from prime user to root, leading to data theft, network pivoting, or ransomware deployment.

🟠

Likely Case

Unauthenticated remote code execution allowing attackers to install backdoors, steal credentials, or disrupt operations.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, potentially allowing file upload but preventing command execution.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation via web interface makes internet-facing systems extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, unauthenticated access allows lateral movement and significant damage.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Metasploit module available (exploit/linux/http/cisco_prime_tftp_rce). Simple exploitation with public tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.4.1 and later

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-pi-tftp

Restart Required: Yes

Instructions:

1. Backup configuration. 2. Download Prime Infrastructure 3.4.1 or later from Cisco Software Center. 3. Install update following Cisco's upgrade guide. 4. Verify installation and restart services.

🔧 Temporary Workarounds

Disable TFTP via Web Interface

all

Remove TFTP file upload capability from web interface to block exploitation vector.

Navigate to Administration > Settings > TFTP Server Settings > Disable TFTP

Network Access Control

linux

Restrict access to Prime Infrastructure web interface using firewall rules.

iptables -A INPUT -p tcp --dport 80,443 -s trusted_networks -j ACCEPT
iptables -A INPUT -p tcp --dport 80,443 -j DROP

🧯 If You Can't Patch

  • Isolate system on dedicated VLAN with strict firewall rules allowing only necessary management traffic
  • Implement web application firewall (WAF) to block malicious upload patterns and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Prime Infrastructure version via web interface (Help > About) or CLI command 'show version' and compare to vulnerable versions (< 3.4.1).

Check Version:

show version | include Version

Verify Fix Applied:

Verify version is 3.4.1 or later and test TFTP upload functionality is properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • TFTP file upload attempts in web server logs
  • Unusual process execution by prime user in system logs
  • File creation in normally restricted directories

Network Indicators:

  • TFTP traffic to Prime Infrastructure on unusual ports
  • HTTP POST requests with file upload patterns to vulnerable endpoints

SIEM Query:

source="prime_infrastructure_logs" AND (tftp OR upload) AND response_code=200

🔗 References

📤 Share & Export