The network devices manufacturer giant Cisco published an advisory on 19th April 2023 in which Cisco detailed Command Injection and File Permissions Vulnerabilities in Cisco Industrial Network Director (IND). The vulnerability tracked as CVE-2023-20036 is a Critical severity vulnerability with a CVSS score of 9.9 out of 10. And the vulnerability tracked as CVE-2023-20039 is a Medium severity vulnerability with a CVSS score of 5.5 out of 10. Both the vulnerabilities are lice in the web-based user interface of affected Cisco IND. Since this flaw allows the authenticated attacker to to inject arbitrary operating system commands or access sensitive data of an affected device, it is most important to fix the CVE-2023-20036 And CVE-2023-20039 vulnerabilities. Let’s see how to fix CVE-2023-20036 And CVE-2023-20039, Command Injection and File Permissions Vulnerabilities in Cisco Industrial Network Director.
Cisco Industrial Network Director (IND) is a network management solution designed for operational technology (OT) environments. It assists operations teams in deploying and monitoring Cisco Industrial Ethernet Switches in industrial networks. The main goal of Cisco IND is to improve system availability and reduce downtime, leading to increased efficiency in industrial settings.
This is a critical Command Injection vulnerability in the web UI of Cisco IND, a network management solution specifically designed for operational technology (OT) environments. The flaw is due to improper input validation when uploading a Device Pack and could be exploited by altering the request sent when uploading a Device Pack. This vulnerability could enable an authenticated attacker to execute arbitrary commands as NT AUTHORITY\SYSTEM on the underlying operating system of an affected device.
Associated CVE ID | CVE-2023-20036 |
Description | A Critical Severity Command Injection Vulnerability in Cisco Industrial Network Director |
Associated ZDI ID | – |
CVSS Score | 9.9 critical |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
Impact Score | – |
Exploitability Score | – |
Attack Vector (AV) | Local |
Attack Complexity (AC) | Low |
Privilege Required (PR) | Low |
User Interaction (UI) | None |
Scope | Unchanged |
Confidentiality (C) | None |
Integrity (I) | None |
availability (a) | High |
This is a medium severity File Permissions vulnerability in Cisco IND, a network management solution specifically designed for operational technology (OT) environments. The flaw is due to insufficient default file permissions that are applied to the application data directory and could be exploited by accessing files in the application data directory. This vulnerability could enable an attacker to view sensitive information of an affected device.
Associated CVE ID | CVE-2023-20036 |
Description | A Medium Severity File Permissions Vulnerability in in Cisco Industrial Network Director |
Associated ZDI ID | – |
CVSS Score | 5.5 Medium |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
Impact Score | – |
Exploitability Score | – |
Attack Vector (AV) | Local |
Attack Complexity (AC) | Low |
Privilege Required (PR) | Low |
User Interaction (UI) | None |
Scope | Unchanged |
Confidentiality (C) | None |
Integrity (I) | High |
availability (a) | None |
As per the advisory published by Cisco, all the versions of Cisco IND are affected, which is less than 1.11.3.
Unfortunately, there are no known workarounds to fully address these vulnerabilities. Cisco rolled out a patch by releasing v1.11.3. Users of Cisco IND are advised to upgrade to 1.11.3 to fix the Command Injection and File Permissions Vulnerabilities in Cisco Industrial Network Director.
Welcome to our comprehensive guide on upgrading the Cisco Industrial Network Director (IND) application on Microsoft Windows Operating Systems (OS). With this guide, we aim to provide you with the latest information to ensure a smooth and efficient installation/upgradation process, followed by easy access to the application after installation. By following our step-by-step instructions, you’ll unlock the full potential of your Cisco IND experience.
Before diving into the installation/upgradation process, it’s crucial to ensure that your system meets the minimum requirements to run the Cisco IND application. This section outlines the essential system specifications needed for a seamless experience.
Table 1. Essential System Requirements for Cisco IND
Category | Minimum Requirement |
---|---|
Operating System (OS) | Windows 10 |
Windows Server Support | – Windows Server 2012 R2 |
– Windows Server 2016 | |
– Windows Server 2019 R2 | |
Browser Compatibility | – Chrome: Version 50.0.2661.75 or 53.0.2785.116 |
– Firefox: 55.0.3, 57.0.4, 63.0.3 or above | |
RAM | 8 GB |
CPU | Quad-Core 1.8 GHz |
Storage | 50 GB |
It’s essential to note that the Cisco IND application v1.11.x exclusively supports 64-bit versions of the listed operating systems. Make sure your system is compatible before proceeding with the installation.
Before embarking on a new installation or upgrading your existing IND software, follow these crucial steps to ensure a smooth and seamless process.
Consistent User Account: Use the same user account for both installation and upgrade to maintain consistency and prevent potential issues.
Computer Name Limitation: Ensure your computer name is no longer than 15 characters, as recommended for Windows systems.
Avoid Interrupting the Rollback Process: Do not manually stop the rollback process during its execution, as this may leave your system in an unstable state.
Password Policy Compliance: Make certain that your password policy allows for the initial password set for the Postgres user. The password pattern will be as follows:Ind$<16 digit alpha numeric characters ><computer name>
Granting Necessary Privileges: Confirm that the Postgres Windows user account created by the installer has not been denied the “Log on as a service” privilege by your administrator. To verify this, open the Local Security Policy and navigate to Local Security Settings\Local Policies\User Rights Assignment, ensuring that the Postgres user or Users group is not added to the “Deny log on as a service” list.
Before installing the IND software package, make sure to:
Close the Windows services management console.
Terminate any command prompt, notepad, or application with open IND files and folders.
Prevent the Windows machine hosting the IND software from being powered off abruptly, as this may lead to file loss and necessitate reinstallation. To safeguard against this, schedule periodic backup tasks after IND installation.
Note: Consult the Settings > Backup section of the Dashboard Help in IND after installation to learn how to schedule periodic upgrade backup tasks. Additionally, refer to the Restore Database Backup section of this document for instructions on restoring an earlier IND backup.
Ensuring Required Ports are Open
For proper functionality, open the necessary ports for inbound, outbound, and bidirectional traffic on your firewall. The default ports are as follows:
Inbound Traffic:
TCP ports: 21, 8088, 8443, 50000-50050
UDP port: 30162
Outbound Traffic:
TCP ports: 443, 80, 22, 23, 44818, 102, 502, 4840, 139, 1812
UDP ports: 161, 67, 2222, 34964, 4840
Both Inbound and Outbound Traffic:
TCP ports: 8910, 47808
Note: If any ports are customized during installation or within the access profile, open the corresponding ports in the firewall.
Close the Windows services management console and any command prompt, notepad, or application with open IND files and folders.
When using PnP in your network, adhere to the following guidelines:
Start and run an NTP server in the network, either on a separate Windows server or on the laptop or desktop where IND is installed.
Keep the NTP service running at all times if using a separate Windows server in the network.
When running an IE1000 switch in your network, add the NTP server IP address in the DHCP Option 43 field to support PnP.
If running the NTP server on the IND server (laptop or desktop), follow these steps to start the Windows Time Service and ensure it runs continuously:a. Click the Start button and search for “services.msc” in the Search programs and files field.b. Locate Windows Time, check its current status, and open to make changes.c. Set the Startup type to Automatic.
By following this comprehensive guide to installing and upgrading IND software, you can ensure a smooth and successful process. Remember to adhere to the pre-installation steps, open the necessary ports, and implement PnP correctly to get the most out of your IND software.
This comprehensive guide will walk you through the step-by-step process of upgrading Cisco IND to 1.11.x, ensuring a seamless transition. For comphrensive information, please refer to the official installation or upgradation guide and release notes.
Time needed: 30 minutes.
Instructions to Upgrade Cisco IND to 1.11.X
Download the Cisco IND Software Package
To begin, navigate to the Cisco Download Software page at https://software.cisco.com/download/home and follow this path: Products > Cloud and Systems Management > IoT Management and Automation > Industrial Network Director. From the Industrial Network Director software page, select the desired 1.11.x software release. Click on the download link for the required 1.11.x software release. This will initiate the download of the IND installer file (e.g., ind-1.11.0-xxx-installer.exe).
Launch the Installer
Double-click the downloaded installer file (e.g., ind-1.11.0-xxx-installer.exe) and click ‘Yes’ when prompted by the User Account Control to allow the installation on your system.
Select Language
In the Language Selection window, the default language will appear in the drop-down menu. This will be the same language you chose during the original installation. Click ‘OK’ to proceed.
Confirm the Upgrade
A pop-up window will appear, asking you to confirm the upgrade of your current IND application to the new version. Click ‘Yes’ to upgrade or ‘No’ to cancel the process.
Navigate the Setup Wizard and Accept the License Agreement
Upon reaching the Setup Wizard screen, click ‘Next’ to continue. At the License Agreement page, select the ‘I accept the agreement’ radio button, and click ‘Next’.
Begin Installation
On the Ready to Install screen, click ‘Next’ to start the installation of the IND application on your system. For upgrades, you can choose the ‘Customize’ option, which allows for system profile selection. The same system profile you chose during the initial installation will apply after the upgrade.
Important Notes Regarding IND Upgrades
1. During an IND upgrade, a progress pop-up will display until all IND Services have initialized and become accessible. Depending on your PC configuration, this may take up to 8 minutes. Please wait for the initialization progress pop-up to complete.
2. When upgrading from IND 1.8.0 release, the folder location is: %ALLUSERSPROFILE%\Cisco\Cisco Industrial Network Director for all upgrades from IND 1.8.0.
3. The installer will create a backup of your existing installation before the upgrade, storing it in the installation directory. If the application is not reachable after the upgrade, you can restore IND to its previous state using this backup. To do this, copy the backup file to a separate directory outside the installation directory, uninstall and reinstall the previous version of IND, and then restore the backup.
We hope this post helped you know how to fix CVE-2023-20036 And CVE-2023-20039, Command Injection, and File Permissions Vulnerabilities in Cisco Industrial Network Director. Please share this post if you find this interested. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram, and subscribe to receive updates like this.
You may also like these articles:
How To Fix CVE-2022-20695- A Critical Authentication Bypass Vulnerability In Cisco WLC
How To Fix CVE-2022-20650- The New RCE Vulnerability In Cisco Switches?
How to Fix CVE-2023-20154- An Authentication Bypass Vulnerability in Cisco Modeling Labs?
What is Command Injection Vulnerability? And How To Prevent It?
How To Fix CVE-2022-20798- An Authentication Bypass Vulnerability In Cisco ESA And Cisco SMA
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.