Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2020-02738

Опубликовано: 03 июн. 2020
Источник: fstec
CVSS3: 8.8
CVSS2: 8.3
EPSS Низкий

Описание

Уязвимость в реализации канала между виртуальными машинами операционной системы Cisco IOS связана с недостаточной проверкой вводимых данных. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco IOS

Версия ПО

15.6(1)T0a (Cisco IOS)
15.5(3)M (Cisco IOS)
15.5(1)T (Cisco IOS)
15.5(2)T (Cisco IOS)
15.5(1)T3 (Cisco IOS)
15.5(2)T1 (Cisco IOS)
15.5(2)T2 (Cisco IOS)
15.5(2)T3 (Cisco IOS)
15.5(2)T4 (Cisco IOS)
15.5(1)T4 (Cisco IOS)
15.5(3)M1 (Cisco IOS)
15.5(3)M0a (Cisco IOS)
15.5(3)M2 (Cisco IOS)
15.5(3)M3 (Cisco IOS)
15.5(3)M4 (Cisco IOS)
15.5(3)M4a (Cisco IOS)
15.5(3)M5 (Cisco IOS)
15.5(3)M6 (Cisco IOS)
15.5(3)M6a (Cisco IOS)
15.6(1)T (Cisco IOS)
15.6(2)T (Cisco IOS)
15.6(1)T1 (Cisco IOS)
15.6(2)T1 (Cisco IOS)
15.6(1)T2 (Cisco IOS)
15.6(2)T2 (Cisco IOS)
15.6(1)T3 (Cisco IOS)
15.6(2)T3 (Cisco IOS)
15.6(3)M (Cisco IOS)
15.6(3)M1 (Cisco IOS)
15.6(3)M0a (Cisco IOS)
15.6(3)M1b (Cisco IOS)
15.6(3)M2 (Cisco IOS)
15.6(3)M3 (Cisco IOS)
15.6(3)M3a (Cisco IOS)
15.7(3)M (Cisco IOS)
15.3(3)JAA1 (Cisco IOS)
15.5(1)T2 (Cisco IOS)
15.4(3)M6a (Cisco IOS)
15.4(3)M7 (Cisco IOS)
15.4(3)M6 (Cisco IOS)
15.4(3)M5 (Cisco IOS)
15.4(3)M4 (Cisco IOS)
15.6(3)M6 (Cisco IOS)
15.7(3)M3 (Cisco IOS)
15.8(3)M (Cisco IOS)
15.8(3)M0a (Cisco IOS)
15.5(3)M2a (Cisco IOS)
15.4(3)M (Cisco IOS)
15.4(3)M1 (Cisco IOS)
15.4(3)M2 (Cisco IOS)
15.4(3)M3 (Cisco IOS)
15.4(3)M8 (Cisco IOS)
15.4(3)M9 (Cisco IOS)
15.4(3)M10 (Cisco IOS)
15.5(3)M7 (Cisco IOS)
15.5(3)M8 (Cisco IOS)
15.6(3)M4 (Cisco IOS)
15.6(3)M5 (Cisco IOS)
15.7(3)M1 (Cisco IOS)
15.7(3)M2 (Cisco IOS)
15.4(1)CG (Cisco IOS)
15.4(2)CG (Cisco IOS)
15.2(4)JAZ1 (Cisco IOS)
12.2(60)EZ16 (Cisco IOS)
15.0(2)SG11a (Cisco IOS)
15.5(3)M9 (Cisco IOS)
15.5(3)M10 (Cisco IOS)
15.5(3)M11 (Cisco IOS)
15.6(3)M7 (Cisco IOS)
15.6(3)M6a (Cisco IOS)
15.6(3)M6b (Cisco IOS)
15.6(3)M8 (Cisco IOS)
15.6(3)M9 (Cisco IOS)
15.7(3)M4 (Cisco IOS)
15.7(3)M5 (Cisco IOS)
15.7(3)M4a (Cisco IOS)
15.7(3)M4b (Cisco IOS)
15.7(3)M6 (Cisco IOS)
15.7(3)M7 (Cisco IOS)
15.8(3)M1 (Cisco IOS)
15.8(3)M2 (Cisco IOS)
15.8(3)M3 (Cisco IOS)
15.8(3)M2a (Cisco IOS)
15.8(3)M4 (Cisco IOS)
15.8(3)M3a (Cisco IOS)
15.8(3)M3b (Cisco IOS)
15.8(3)M5 (Cisco IOS)
15.9(3)M (Cisco IOS)
15.9(3)M0a (Cisco IOS)
15.3(3)JPI (Cisco IOS)
15.3(3)JPJ (Cisco IOS)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Cisco Systems Inc. Cisco IOS 15.6(1)T0a
Cisco Systems Inc. Cisco IOS 15.5(3)M
Cisco Systems Inc. Cisco IOS 15.5(1)T
Cisco Systems Inc. Cisco IOS 15.5(2)T
Cisco Systems Inc. Cisco IOS 15.5(1)T3
Cisco Systems Inc. Cisco IOS 15.5(2)T1
Cisco Systems Inc. Cisco IOS 15.5(2)T2
Cisco Systems Inc. Cisco IOS 15.5(2)T3
Cisco Systems Inc. Cisco IOS 15.5(2)T4
Cisco Systems Inc. Cisco IOS 15.5(1)T4
Cisco Systems Inc. Cisco IOS 15.5(3)M1
Cisco Systems Inc. Cisco IOS 15.5(3)M0a
Cisco Systems Inc. Cisco IOS 15.5(3)M2
Cisco Systems Inc. Cisco IOS 15.5(3)M3
Cisco Systems Inc. Cisco IOS 15.5(3)M4
Cisco Systems Inc. Cisco IOS 15.5(3)M4a
Cisco Systems Inc. Cisco IOS 15.5(3)M5
Cisco Systems Inc. Cisco IOS 15.5(3)M6
Cisco Systems Inc. Cisco IOS 15.5(3)M6a
Cisco Systems Inc. Cisco IOS 15.6(1)T
Cisco Systems Inc. Cisco IOS 15.6(2)T
Cisco Systems Inc. Cisco IOS 15.6(1)T1
Cisco Systems Inc. Cisco IOS 15.6(2)T1
Cisco Systems Inc. Cisco IOS 15.6(1)T2
Cisco Systems Inc. Cisco IOS 15.6(2)T2
Cisco Systems Inc. Cisco IOS 15.6(1)T3
Cisco Systems Inc. Cisco IOS 15.6(2)T3
Cisco Systems Inc. Cisco IOS 15.6(3)M
Cisco Systems Inc. Cisco IOS 15.6(3)M1
Cisco Systems Inc. Cisco IOS 15.6(3)M0a
Cisco Systems Inc. Cisco IOS 15.6(3)M1b
Cisco Systems Inc. Cisco IOS 15.6(3)M2
Cisco Systems Inc. Cisco IOS 15.6(3)M3
Cisco Systems Inc. Cisco IOS 15.6(3)M3a
Cisco Systems Inc. Cisco IOS 15.7(3)M
Cisco Systems Inc. Cisco IOS 15.3(3)JAA1
Cisco Systems Inc. Cisco IOS 15.5(1)T2
Cisco Systems Inc. Cisco IOS 15.4(3)M6a
Cisco Systems Inc. Cisco IOS 15.4(3)M7
Cisco Systems Inc. Cisco IOS 15.4(3)M6
Cisco Systems Inc. Cisco IOS 15.4(3)M5
Cisco Systems Inc. Cisco IOS 15.4(3)M4
Cisco Systems Inc. Cisco IOS 15.6(3)M6
Cisco Systems Inc. Cisco IOS 15.7(3)M3
Cisco Systems Inc. Cisco IOS 15.8(3)M
Cisco Systems Inc. Cisco IOS 15.8(3)M0a
Cisco Systems Inc. Cisco IOS 15.5(3)M2a
Cisco Systems Inc. Cisco IOS 15.4(3)M
Cisco Systems Inc. Cisco IOS 15.4(3)M1
Cisco Systems Inc. Cisco IOS 15.4(3)M2
Cisco Systems Inc. Cisco IOS 15.4(3)M3
Cisco Systems Inc. Cisco IOS 15.4(3)M8
Cisco Systems Inc. Cisco IOS 15.4(3)M9
Cisco Systems Inc. Cisco IOS 15.4(3)M10
Cisco Systems Inc. Cisco IOS 15.5(3)M7
Cisco Systems Inc. Cisco IOS 15.5(3)M8
Cisco Systems Inc. Cisco IOS 15.6(3)M4
Cisco Systems Inc. Cisco IOS 15.6(3)M5
Cisco Systems Inc. Cisco IOS 15.7(3)M1
Cisco Systems Inc. Cisco IOS 15.7(3)M2
Cisco Systems Inc. Cisco IOS 15.4(1)CG
Cisco Systems Inc. Cisco IOS 15.4(2)CG
Cisco Systems Inc. Cisco IOS 15.2(4)JAZ1
Cisco Systems Inc. Cisco IOS 12.2(60)EZ16
Cisco Systems Inc. Cisco IOS 15.0(2)SG11a
Cisco Systems Inc. Cisco IOS 15.5(3)M9
Cisco Systems Inc. Cisco IOS 15.5(3)M10
Cisco Systems Inc. Cisco IOS 15.5(3)M11
Cisco Systems Inc. Cisco IOS 15.6(3)M7
Cisco Systems Inc. Cisco IOS 15.6(3)M6a
Cisco Systems Inc. Cisco IOS 15.6(3)M6b
Cisco Systems Inc. Cisco IOS 15.6(3)M8
Cisco Systems Inc. Cisco IOS 15.6(3)M9
Cisco Systems Inc. Cisco IOS 15.7(3)M4
Cisco Systems Inc. Cisco IOS 15.7(3)M5
Cisco Systems Inc. Cisco IOS 15.7(3)M4a
Cisco Systems Inc. Cisco IOS 15.7(3)M4b
Cisco Systems Inc. Cisco IOS 15.7(3)M6
Cisco Systems Inc. Cisco IOS 15.7(3)M7
Cisco Systems Inc. Cisco IOS 15.8(3)M1
Cisco Systems Inc. Cisco IOS 15.8(3)M2
Cisco Systems Inc. Cisco IOS 15.8(3)M3
Cisco Systems Inc. Cisco IOS 15.8(3)M2a
Cisco Systems Inc. Cisco IOS 15.8(3)M4
Cisco Systems Inc. Cisco IOS 15.8(3)M3a
Cisco Systems Inc. Cisco IOS 15.8(3)M3b
Cisco Systems Inc. Cisco IOS 15.8(3)M5
Cisco Systems Inc. Cisco IOS 15.9(3)M
Cisco Systems Inc. Cisco IOS 15.9(3)M0a
Cisco Systems Inc. Cisco IOS 15.3(3)JPI
Cisco Systems Inc. Cisco IOS 15.3(3)JPJ

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 8,3)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 8,8)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 51%
0.00282
Низкий

8.8 High

CVSS3

8.3 High

CVSS2

Связанные уязвимости

CVSS3: 8.8
nvd
больше 5 лет назад

A vulnerability in the implementation of the inter-VM channel of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, adjacent attacker to execute arbitrary shell commands on the Virtual Device Server (VDS) of an affected device. The vulnerability is due to insufficient validation of signaling packets that are destined to VDS. An attacker could exploit this vulnerability by sending malicious packets to an affected device. A successful exploit could allow the attacker to execute arbitrary commands in the context of the Linux shell of VDS with the privileges of the root user. Because the device is designed on a hypervisor architecture, exploitation of a vulnerability that affects the inter-VM channel may lead to a complete system compromise. For more information about this vulnerability, see the Details section of this advisory.

CVSS3: 8.8
github
больше 3 лет назад

A vulnerability in the implementation of the inter-VM channel of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an unauthenticated, adjacent attacker to execute arbitrary shell commands on the Virtual Device Server (VDS) of an affected device. The vulnerability is due to insufficient validation of signaling packets that are destined to VDS. An attacker could exploit this vulnerability by sending malicious packets to an affected device. A successful exploit could allow the attacker to execute arbitrary commands in the context of the Linux shell of VDS with the privileges of the root user. Because the device is designed on a hypervisor architecture, exploitation of a vulnerability that affects the inter-VM channel may lead to a complete system compromise. For more information about this vulnerability, see the Details section of this advisory.

EPSS

Процентиль: 51%
0.00282
Низкий

8.8 High

CVSS3

8.3 High

CVSS2