Java.Debug.Wire.Protocol.Insecure.Configuration

description-logoDescription

This indicates an attempt to use Java Debug Wire Protocol (JDWP) to access remote debugging.
JDWP allows remote debugging of Java virtual machine. However this protocol does not authenticate users and is insecure. Attackers can use JDWP to do command injection. The JDWP service port should never be exposed to the public.
This signature can detect attempts to exploit a Remote Code Execution Vulnerability in Cisco Prime Data Center Network Manager. A vulnerability in the role-based access control (RBAC) functionality of Cisco Prime Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to execute arbitrary code with root privileges on an affected system. The vulnerability is due to a lack of authentication and exposing JDWP service port to the public.

affected-products-logoAffected Products

Any servers with JDWP service port exposed to the public are vulnerable
Cisco Prime Data Center Network Manager 10.1(2)
Cisco Prime Data Center Network Manager 10.1(1)
Cisco MDS 9500 Series Multilayer Directors 10.1(2)
Cisco MDS 9500 Series Multilayer Directors 10.1(1)ST(1)
Cisco MDS 9500 Series Multilayer Directors 10.1(1)S5
SonicWall Analytics 2.5 On-Premises prior to version 2.5.2519

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Close the JDWP service port.
Apply the latest update from the vendor
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-dcnm1
Apply the latest update from the vendor
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0018

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2023-02-01 22.487 Sig Added
2022-06-16 21.340 Sig Added
2022-02-28 19.266 Sig Added
2022-02-10 19.258 Sig Added
2022-01-31 19.250 Sig Added
2019-06-10 14.629 Severity:high:critical
2019-03-12 14.571 Default_action:pass:drop