Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2019-01383

Опубликовано: 27 мар. 2019
Источник: fstec
CVSS3: 5.9
CVSS2: 5.4
EPSS Низкий

Описание

Уязвимость компонента Cisco Smart Call Home операционных систем Cisco IOS XE и Cisco IOS существует из-за недостаточной проверки подлинности сертификата. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, раскрыть защищаемую информацию

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco IOS
Cisco IOS XE

Версия ПО

15.6(1)T0a (Cisco IOS)
3.16.1as (Cisco IOS XE)
3.16.2as (Cisco IOS XE)
3.16.2s (Cisco IOS XE)
3.17.0s (Cisco IOS XE)
3.17.1s (Cisco IOS XE)
3.18.0s (Cisco IOS XE)
16.5.1 (Cisco IOS XE)
3.6.5bE (Cisco IOS XE)
16.5.1a (Cisco IOS XE)
16.2.1 (Cisco IOS XE)
3.7.4e (Cisco IOS XE)
3.7.5e (Cisco IOS XE)
15.2(2)E5b (Cisco IOS)
15.5(3)S1 (Cisco IOS)
15.5(3)S1a (Cisco IOS)
15.5(3)S2 (Cisco IOS)
15.5(3)S3 (Cisco IOS)
15.5(3)S4 (Cisco IOS)
15.5(3)S5 (Cisco IOS)
15.5(3)S6 (Cisco IOS)
15.5(3)S6a (Cisco IOS)
15.6(1)S (Cisco IOS)
15.6(2)S (Cisco IOS)
15.6(2)S1 (Cisco IOS)
15.6(1)S1 (Cisco IOS)
15.6(1)S2 (Cisco IOS)
15.6(2)S2 (Cisco IOS)
15.6(1)S3 (Cisco IOS)
15.6(2)S3 (Cisco IOS)
15.6(1)S4 (Cisco IOS)
15.6(2)S4 (Cisco IOS)
15.6(1)T (Cisco IOS)
15.6(2)T (Cisco IOS)
15.6(1)T1 (Cisco IOS)
15.6(2)T1 (Cisco IOS)
15.6(1)T2 (Cisco IOS)
15.6(2)T2 (Cisco IOS)
15.6(1)T3 (Cisco IOS)
15.6(2)T3 (Cisco IOS)
15.6(2)SP (Cisco IOS)
15.6(2)SP1 (Cisco IOS)
15.6(2)SP2 (Cisco IOS)
15.6(2)SP3 (Cisco IOS)
15.6(2)SN (Cisco IOS)
15.6(3)M (Cisco IOS)
15.6(3)M1 (Cisco IOS)
15.6(3)M0a (Cisco IOS)
15.6(3)M1b (Cisco IOS)
15.6(3)M2 (Cisco IOS)
15.6(3)M2a (Cisco IOS)
15.6(3)M3 (Cisco IOS)
15.6(3)M3a (Cisco IOS)
15.7(3)M (Cisco IOS)
15.7(3)M0a (Cisco IOS)
15.1(4)M12c (Cisco IOS)
15.1(2)SG8a (Cisco IOS)
15.2(3)E1 (Cisco IOS)
15.2(2)E4 (Cisco IOS)
15.2(2)E5 (Cisco IOS)
15.2(4)E2 (Cisco IOS)
15.2(3)E4 (Cisco IOS)
15.2(5)E (Cisco IOS)
15.2(4)E3 (Cisco IOS)
15.2(2)E6 (Cisco IOS)
15.2(5)E1 (Cisco IOS)
15.2(4m)E3 (Cisco IOS)
15.2(2)E5a (Cisco IOS)
15.2(3)E5 (Cisco IOS)
15.2(2)E7 (Cisco IOS)
15.2(5)E2 (Cisco IOS)
15.2(4p)E1 (Cisco IOS)
15.2(6)E (Cisco IOS)
15.2(5)E2b (Cisco IOS)
15.2(5)E2c (Cisco IOS)
15.2(4m)E2 (Cisco IOS)
15.2(4o)E3 (Cisco IOS)
15.2(4q)E1 (Cisco IOS)
15.2(6)E0a (Cisco IOS)
15.2(2)E7b (Cisco IOS)
15.2(4)E5a (Cisco IOS)
15.3(3)JN1 (Cisco IOS)
15.3(3)JN2 (Cisco IOS)
15.6(2)SP3b (Cisco IOS)
15.2(5a)E (Cisco IOS)
15.2(5c)E (Cisco IOS)
15.1(3)SVG3d (Cisco IOS)
16.2.2 (Cisco IOS XE)
16.3.1 (Cisco IOS XE)
16.3.2 (Cisco IOS XE)
16.3.3 (Cisco IOS XE)
16.3.4 (Cisco IOS XE)
16.3.5 (Cisco IOS XE)
16.3.5b (Cisco IOS XE)
16.4.1 (Cisco IOS XE)
16.6.1 (Cisco IOS XE)
16.7.1b (Cisco IOS XE)
3.6.4E (Cisco IOS XE)
3.6.5E (Cisco IOS XE)
3.6.6E (Cisco IOS XE)
3.6.5aE (Cisco IOS XE)
3.6.7E (Cisco IOS XE)
3.6.7bE (Cisco IOS XE)
3.8.2E (Cisco IOS XE)
3.8.3E (Cisco IOS XE)
3.8.4E (Cisco IOS XE)
3.8.5E (Cisco IOS XE)
3.8.5aE (Cisco IOS XE)
3.9.0E (Cisco IOS XE)
3.9.1E (Cisco IOS XE)
3.9.2E (Cisco IOS XE)
3.9.2bE (Cisco IOS XE)
3.10.0E (Cisco IOS XE)
3.10.0cE (Cisco IOS XE)
16.4.3 (Cisco IOS XE)
16.7.2 (Cisco IOS XE)
3.16.1S (Cisco IOS XE)
3.16.3S (Cisco IOS XE)
3.16.2bS (Cisco IOS XE)
3.16.4aS (Cisco IOS XE)
3.16.4bS (Cisco IOS XE)
3.16.4gS (Cisco IOS XE)
3.16.5S (Cisco IOS XE)
3.16.4cS (Cisco IOS XE)
3.16.4dS (Cisco IOS XE)
3.16.4eS (Cisco IOS XE)
3.16.6S (Cisco IOS XE)
3.16.5aS (Cisco IOS XE)
3.16.5bS (Cisco IOS XE)
3.16.7S (Cisco IOS XE)
3.16.6bS (Cisco IOS XE)
3.16.7aS (Cisco IOS XE)
3.16.7bS (Cisco IOS XE)
3.17.2S (Cisco IOS XE)
3.17.1aS (Cisco IOS XE)
3.17.3S (Cisco IOS XE)
3.17.4S (Cisco IOS XE)
16.3.6 (Cisco IOS XE)
16.4.2 (Cisco IOS XE)
16.5.1b (Cisco IOS XE)
16.5.2 (Cisco IOS XE)
16.5.3 (Cisco IOS XE)
16.6.2 (Cisco IOS XE)
16.6.3 (Cisco IOS XE)
16.7.1 (Cisco IOS XE)
16.7.1a (Cisco IOS XE)
16.8.1 (Cisco IOS XE)
16.8.1s (Cisco IOS XE)
16.9.1b (Cisco IOS XE)
15.2(4s)E1 (Cisco IOS)
15.2(4a)EA5 (Cisco IOS)
15.1(3)SVI1b (Cisco IOS)
15.3(3)JF35 (Cisco IOS)
15.1(3)SVM3 (Cisco IOS)
15.1(3)SVN2 (Cisco IOS)
15.1(3)SVO1 (Cisco IOS)
15.1(3)SVO2 (Cisco IOS)
12.2(6)I1 (Cisco IOS)
15.1(3)SVP1 (Cisco IOS)
3.16.3aS (Cisco IOS XE)
3.16.4S (Cisco IOS XE)
3.18.0aS (Cisco IOS XE)
3.18.1S (Cisco IOS XE)
3.18.2S (Cisco IOS XE)
3.18.3S (Cisco IOS XE)
3.18.4S (Cisco IOS XE)
3.18.0SP (Cisco IOS XE)
3.18.1SP (Cisco IOS XE)
3.18.1aSP (Cisco IOS XE)
3.18.1gSP (Cisco IOS XE)
3.18.1bSP (Cisco IOS XE)
3.18.1cSP (Cisco IOS XE)
3.18.2SP (Cisco IOS XE)
3.18.1hSP (Cisco IOS XE)
3.18.2aSP (Cisco IOS XE)
3.18.1iSP (Cisco IOS XE)
3.18.3SP (Cisco IOS XE)
3.18.4SP (Cisco IOS XE)
3.18.3aSP (Cisco IOS XE)
3.18.3bSP (Cisco IOS XE)
16.8.1b (Cisco IOS XE)
16.8.1a (Cisco IOS XE)
16.8.1c (Cisco IOS XE)
16.8.1d (Cisco IOS XE)
16.8.2 (Cisco IOS XE)
16.9.1s (Cisco IOS XE)
16.9.1c (Cisco IOS XE)
16.9.1d (Cisco IOS XE)
15.3(3)JA1n (Cisco IOS)
15.6(1)SN (Cisco IOS)
15.6(1)SN1 (Cisco IOS)
15.6(1)SN2 (Cisco IOS)
15.6(1)SN3 (Cisco IOS)
15.6(3)SN (Cisco IOS)
15.6(4)SN (Cisco IOS)
15.6(5)SN (Cisco IOS)
15.6(6)SN (Cisco IOS)
15.6(7)SN (Cisco IOS)
15.6(3)M1a (Cisco IOS)
15.3(3)JI (Cisco IOS)
15.6(2)T0a (Cisco IOS)
15.6(3)M4 (Cisco IOS)
15.7(3)M1 (Cisco IOS)
15.7(3)M2 (Cisco IOS)
3.8.6E (Cisco IOS XE)
3.10.1E (Cisco IOS XE)
3.10.1sE (Cisco IOS XE)
12.4(25e)JAZ1 (Cisco IOS)
15.2(2)E8 (Cisco IOS)
15.2(6)E1 (Cisco IOS)
15.2(4)E6 (Cisco IOS)
15.2(6)E1a (Cisco IOS)
15.2(6)E1s (Cisco IOS)
15.2(4s)E2 (Cisco IOS)
15.2(4)JAZ1 (Cisco IOS)
15.2(5)EA (Cisco IOS)
15.2(4)EA5 (Cisco IOS)
15.2(4)EA8 (Cisco IOS)
3.6.8E (Cisco IOS XE)
Ci3.10.1aE (Cisco IOS XE)
5.2(4)E4 (Cisco IOS)
15.5(3)S7 (Cisco IOS)
12.4(25e)JAP1m (Cisco IOS)
12.4(25e)JAP2 (Cisco IOS)
12.4(25e)JAP26 (Cisco IOS)
15.6(2)SP4 (Cisco IOS)
15.3(3)JD15 (Cisco IOS)
15.3(3)JDA15 (Cisco IOS)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 5,4)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,9)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-call-home-cert

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 55%
0.00328
Низкий

5.9 Medium

CVSS3

5.4 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.9
nvd
почти 7 лет назад

A vulnerability in the Cisco Smart Call Home feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software.

CVSS3: 5.9
github
больше 3 лет назад

A vulnerability in the Cisco Smart Call Home feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software.

EPSS

Процентиль: 55%
0.00328
Низкий

5.9 Medium

CVSS3

5.4 Medium

CVSS2