Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2018-01170

Опубликовано: 26 сент. 2018
Источник: fstec
CVSS3: 6.5
CVSS2: 6.1
EPSS Низкий

Описание

Уязвимость реализации протокола MACsec Key Agreement (MKA) операционной системы Cisco IOS XE, вызвана ошибками контроля доступа. Эксплуатация уязвимости может позволить науршителю, действующему удаленно, обойти процедуру аутентификации и получить доступ к сети

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco IOS XE

Версия ПО

16.5.1 (Cisco IOS XE)
16.1.1 (Cisco IOS XE)
16.1.2 (Cisco IOS XE)
16.1.3 (Cisco IOS XE)
16.3.1a (Cisco IOS XE)
16.5.1a (Cisco IOS XE)
16.2.1 (Cisco IOS XE)
16.2.2 (Cisco IOS XE)
16.3.1 (Cisco IOS XE)
16.3.2 (Cisco IOS XE)
16.3.3 (Cisco IOS XE)
16.3.4 (Cisco IOS XE)
16.3.5 (Cisco IOS XE)
16.3.5b (Cisco IOS XE)
16.4.1 (Cisco IOS XE)
16.6.1 (Cisco IOS XE)
16.7.1b (Cisco IOS XE)
16.4.3 (Cisco IOS XE)
16.7.2 (Cisco IOS XE)
16.9.1h (Cisco IOS XE)
16.3.6 (Cisco IOS XE)
16.4.2 (Cisco IOS XE)
16.5.1b (Cisco IOS XE)
16.5.2 (Cisco IOS XE)
16.5.3 (Cisco IOS XE)
16.6.2 (Cisco IOS XE)
16.6.3 (Cisco IOS XE)
16.7.1 (Cisco IOS XE)
16.7.1a (Cisco IOS XE)
16.8.1 (Cisco IOS XE)
16.9.1b (Cisco IOS XE)
3.18.3bSP (Cisco IOS XE)
16.8.1b (Cisco IOS XE)
16.8.1a (Cisco IOS XE)
16.8.1c (Cisco IOS XE)
16.7.3 (Cisco IOS XE)
3.18SP (Cisco IOS XE)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Cisco Systems Inc. Cisco IOS XE 16.5.1
Cisco Systems Inc. Cisco IOS XE 16.1.1
Cisco Systems Inc. Cisco IOS XE 16.1.2
Cisco Systems Inc. Cisco IOS XE 16.1.3
Cisco Systems Inc. Cisco IOS XE 16.3.1a
Cisco Systems Inc. Cisco IOS XE 16.5.1a
Cisco Systems Inc. Cisco IOS XE 16.2.1
Cisco Systems Inc. Cisco IOS XE 16.2.2
Cisco Systems Inc. Cisco IOS XE 16.3.1
Cisco Systems Inc. Cisco IOS XE 16.3.2
Cisco Systems Inc. Cisco IOS XE 16.3.3
Cisco Systems Inc. Cisco IOS XE 16.3.4
Cisco Systems Inc. Cisco IOS XE 16.3.5
Cisco Systems Inc. Cisco IOS XE 16.3.5b
Cisco Systems Inc. Cisco IOS XE 16.4.1
Cisco Systems Inc. Cisco IOS XE 16.6.1
Cisco Systems Inc. Cisco IOS XE 16.7.1b
Cisco Systems Inc. Cisco IOS XE 16.4.3
Cisco Systems Inc. Cisco IOS XE 16.7.2
Cisco Systems Inc. Cisco IOS XE 16.9.1h
Cisco Systems Inc. Cisco IOS XE 16.3.6
Cisco Systems Inc. Cisco IOS XE 16.4.2
Cisco Systems Inc. Cisco IOS XE 16.5.1b
Cisco Systems Inc. Cisco IOS XE 16.5.2
Cisco Systems Inc. Cisco IOS XE 16.5.3
Cisco Systems Inc. Cisco IOS XE 16.6.2
Cisco Systems Inc. Cisco IOS XE 16.6.3
Cisco Systems Inc. Cisco IOS XE 16.7.1
Cisco Systems Inc. Cisco IOS XE 16.7.1a
Cisco Systems Inc. Cisco IOS XE 16.8.1
Cisco Systems Inc. Cisco IOS XE 16.9.1b
Cisco Systems Inc. Cisco IOS XE 3.18.3bSP
Cisco Systems Inc. Cisco IOS XE 16.8.1b
Cisco Systems Inc. Cisco IOS XE 16.8.1a
Cisco Systems Inc. Cisco IOS XE 16.8.1c
Cisco Systems Inc. Cisco IOS XE 16.7.3
Cisco Systems Inc. Cisco IOS XE 3.18SP

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,1)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 6,5)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-macsec

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 45%
0.00228
Низкий

6.5 Medium

CVSS3

6.1 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.1
nvd
больше 7 лет назад

A vulnerability in the MACsec Key Agreement (MKA) using Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic through a Layer 3 interface of an affected device. The vulnerability is due to a logic error in the affected software. An attacker could exploit this vulnerability by connecting to and passing traffic through a Layer 3 interface of an affected device, if the interface is configured for MACsec MKA using EAP-TLS and is running in access-session closed mode. A successful exploit could allow the attacker to bypass 802.1x network access controls and gain access to the network.

CVSS3: 8.1
github
больше 3 лет назад

A vulnerability in the MACsec Key Agreement (MKA) using Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic through a Layer 3 interface of an affected device. The vulnerability is due to a logic error in the affected software. An attacker could exploit this vulnerability by connecting to and passing traffic through a Layer 3 interface of an affected device, if the interface is configured for MACsec MKA using EAP-TLS and is running in access-session closed mode. A successful exploit could allow the attacker to bypass 802.1x network access controls and gain access to the network.

EPSS

Процентиль: 45%
0.00228
Низкий

6.5 Medium

CVSS3

6.1 Medium

CVSS2