Phone : +91 95 8290 7788 | Email :

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » Critical Flaw in Cisco Elastic Services Controller Allows Full System Takeover

Critical Flaw in Cisco Elastic Services Controller Allows Full System Takeover

Cisco has patched a critical flaw in its virtualized function automation tool, Cisco Elastic Services Controller.

A critical vulnerability in the Cisco Elastic Services Controller could allow an unauthenticated, remote attacker to take full control of impacted systems – merely by sending a crafted request.

Cisco Elastic Services Controller is a virtual network functions manager, which enables businesses to automate the deployment and monitoring of functions running on their virtual machines. The authentication bypass vulnerability, CVE-2019-1867, has a CVSS score of 10 out of 10, making it a critical flaw.

“A vulnerability in the REST API of Cisco Elastic Services Controller (ESC) could allow an unauthenticated, remote attacker to bypass authentication on the REST API,” according to a Cisco Systems security advisory released Tuesday. “Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.”

The vulnerability, which has been patched in Cisco Elastic Services Controller Release 4.5, is due to improper validation of API requests in the REST function, which is a method of allowing communication between a web-based client and server that employs representational state transfer (REST) constraints.

To exploit the flaw, a remote, unauthenticated attacker could simply send a crafted request to the REST API, according to the advisory: “A successful exploit could allow the attacker to execute arbitrary actions through the REST API with administrative privileges on an affected system.”

Cisco Elastic Services Controller

The flaw, which was found during internal security testing, impacts Cisco Elastic Services Controller running Software Release 4.1, 4.2, 4.3, or 4.4 when the REST API is enabled. The REST API is not enabled by default.

Cisco said that there are no indications of the vulnerability being exploited in the wild.

May is on track to be one of the busiest months for Cisco in 2019 in terms of patching, with the tech giant already addressing 44 vulnerabilities this month – even before its regularly scheduled fixes next week. By contrast, in April before Cisco released its regularly-scheduled security advisories it had only patched 8 vulnerabilities.

The vulnerability comes days after Cisco also patched two high-severity vulnerabilities that can be exploited by remote unauthenticated adversaries to launch denial of service attacks. Impacted are Cisco’s TelePresence Video Communication Server and the company’s ASA 5500-X Series Firewalls.

Also last week Cisco reported 22 other high-severity vulnerabilities, and a critical bug (CVE-2019-1804) impacting the company’s software-defined networking software and its Nexus 9000 data center router.

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India













What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.


Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.


Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : | Support Email :

Register & Request Quote | Submit Support Ticket