Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2020-02884

Опубликовано: 03 июн. 2020
Источник: fstec
CVSS3: 6.7
CVSS2: 6.8
EPSS Низкий

Описание

Уязвимость функционала проверки файлов образов операционной системы Cisco IOS, связана с недостатками разграничения доступа. Эксплуатация уязвимости может позволить нарушителю установить вредоносное программное обеспечение

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco IOS

Версия ПО

15.6(1)T0a (Cisco IOS)
15.5(3)M1 (Cisco IOS)
15.5(3)M0a (Cisco IOS)
15.5(3)M2 (Cisco IOS)
15.5(3)M3 (Cisco IOS)
15.5(3)M4 (Cisco IOS)
15.5(3)M4a (Cisco IOS)
15.5(3)M5 (Cisco IOS)
15.5(3)M6 (Cisco IOS)
15.5(3)M6a (Cisco IOS)
15.6(1)T (Cisco IOS)
15.6(1)T1 (Cisco IOS)
15.6(1)T2 (Cisco IOS)
15.6(1)T3 (Cisco IOS)
15.6(3)M (Cisco IOS)
15.6(3)M1 (Cisco IOS)
15.6(3)M0a (Cisco IOS)
15.6(3)M1b (Cisco IOS)
15.6(3)M2 (Cisco IOS)
15.6(3)M3 (Cisco IOS)
15.6(3)M3a (Cisco IOS)
15.7(3)M (Cisco IOS)
15.3(3)JAA1 (Cisco IOS)
15.6(3)M6 (Cisco IOS)
15.7(3)M3 (Cisco IOS)
15.8(3)M (Cisco IOS)
15.8(3)M0a (Cisco IOS)
15.5(3)M2a (Cisco IOS)
15.5(3)M7 (Cisco IOS)
15.5(3)M8 (Cisco IOS)
15.6(3)M4 (Cisco IOS)
15.6(3)M5 (Cisco IOS)
15.7(3)M1 (Cisco IOS)
15.7(3)M2 (Cisco IOS)
12.2(60)EZ16 (Cisco IOS)
15.0(2)SG11a (Cisco IOS)
15.5(3)M9 (Cisco IOS)
15.5(3)M10 (Cisco IOS)
15.5(3)M11 (Cisco IOS)
15.6(3)M7 (Cisco IOS)
15.6(3)M6a (Cisco IOS)
15.6(3)M6b (Cisco IOS)
15.6(3)M8 (Cisco IOS)
15.6(3)M9 (Cisco IOS)
15.7(3)M4 (Cisco IOS)
15.7(3)M5 (Cisco IOS)
15.7(3)M4a (Cisco IOS)
15.7(3)M4b (Cisco IOS)
15.7(3)M6 (Cisco IOS)
15.7(3)M7 (Cisco IOS)
15.8(3)M1 (Cisco IOS)
15.8(3)M2 (Cisco IOS)
15.8(3)M3 (Cisco IOS)
15.8(3)M2a (Cisco IOS)
15.8(3)M4 (Cisco IOS)
15.8(3)M5 (Cisco IOS)
15.3(3)JPJ (Cisco IOS)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Cisco Systems Inc. Cisco IOS 15.6(1)T0a
Cisco Systems Inc. Cisco IOS 15.5(3)M1
Cisco Systems Inc. Cisco IOS 15.5(3)M0a
Cisco Systems Inc. Cisco IOS 15.5(3)M2
Cisco Systems Inc. Cisco IOS 15.5(3)M3
Cisco Systems Inc. Cisco IOS 15.5(3)M4
Cisco Systems Inc. Cisco IOS 15.5(3)M4a
Cisco Systems Inc. Cisco IOS 15.5(3)M5
Cisco Systems Inc. Cisco IOS 15.5(3)M6
Cisco Systems Inc. Cisco IOS 15.5(3)M6a
Cisco Systems Inc. Cisco IOS 15.6(1)T
Cisco Systems Inc. Cisco IOS 15.6(1)T1
Cisco Systems Inc. Cisco IOS 15.6(1)T2
Cisco Systems Inc. Cisco IOS 15.6(1)T3
Cisco Systems Inc. Cisco IOS 15.6(3)M
Cisco Systems Inc. Cisco IOS 15.6(3)M1
Cisco Systems Inc. Cisco IOS 15.6(3)M0a
Cisco Systems Inc. Cisco IOS 15.6(3)M1b
Cisco Systems Inc. Cisco IOS 15.6(3)M2
Cisco Systems Inc. Cisco IOS 15.6(3)M3
Cisco Systems Inc. Cisco IOS 15.6(3)M3a
Cisco Systems Inc. Cisco IOS 15.7(3)M
Cisco Systems Inc. Cisco IOS 15.3(3)JAA1
Cisco Systems Inc. Cisco IOS 15.6(3)M6
Cisco Systems Inc. Cisco IOS 15.7(3)M3
Cisco Systems Inc. Cisco IOS 15.8(3)M
Cisco Systems Inc. Cisco IOS 15.8(3)M0a
Cisco Systems Inc. Cisco IOS 15.5(3)M2a
Cisco Systems Inc. Cisco IOS 15.5(3)M7
Cisco Systems Inc. Cisco IOS 15.5(3)M8
Cisco Systems Inc. Cisco IOS 15.6(3)M4
Cisco Systems Inc. Cisco IOS 15.6(3)M5
Cisco Systems Inc. Cisco IOS 15.7(3)M1
Cisco Systems Inc. Cisco IOS 15.7(3)M2
Cisco Systems Inc. Cisco IOS 12.2(60)EZ16
Cisco Systems Inc. Cisco IOS 15.0(2)SG11a
Cisco Systems Inc. Cisco IOS 15.5(3)M9
Cisco Systems Inc. Cisco IOS 15.5(3)M10
Cisco Systems Inc. Cisco IOS 15.5(3)M11
Cisco Systems Inc. Cisco IOS 15.6(3)M7
Cisco Systems Inc. Cisco IOS 15.6(3)M6a
Cisco Systems Inc. Cisco IOS 15.6(3)M6b
Cisco Systems Inc. Cisco IOS 15.6(3)M8
Cisco Systems Inc. Cisco IOS 15.6(3)M9
Cisco Systems Inc. Cisco IOS 15.7(3)M4
Cisco Systems Inc. Cisco IOS 15.7(3)M5
Cisco Systems Inc. Cisco IOS 15.7(3)M4a
Cisco Systems Inc. Cisco IOS 15.7(3)M4b
Cisco Systems Inc. Cisco IOS 15.7(3)M6
Cisco Systems Inc. Cisco IOS 15.7(3)M7
Cisco Systems Inc. Cisco IOS 15.8(3)M1
Cisco Systems Inc. Cisco IOS 15.8(3)M2
Cisco Systems Inc. Cisco IOS 15.8(3)M3
Cisco Systems Inc. Cisco IOS 15.8(3)M2a
Cisco Systems Inc. Cisco IOS 15.8(3)M4
Cisco Systems Inc. Cisco IOS 15.8(3)M5
Cisco Systems Inc. Cisco IOS 15.3(3)JPJ

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,8)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 6,7)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-ir800-img-verif-wHhLYHjK

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 17%
0.00055
Низкий

6.7 Medium

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.7
nvd
больше 5 лет назад

A vulnerability in the image verification feature of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) could allow an authenticated, local attacker to boot a malicious software image on an affected device. The vulnerability is due to insufficient access restrictions on the area of code that manages the image verification feature. An attacker could exploit this vulnerability by first authenticating to the targeted device and then logging in to the Virtual Device Server (VDS) of an affected device. The attacker could then, from the VDS shell, disable Cisco IOS Software integrity (image) verification. A successful exploit could allow the attacker to boot a malicious Cisco IOS Software image on the targeted device. To exploit this vulnerability, the attacker must have valid user credentials at privilege level 15.

CVSS3: 6.7
github
больше 3 лет назад

A vulnerability in the image verification feature of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) could allow an authenticated, local attacker to boot a malicious software image on an affected device. The vulnerability is due to insufficient access restrictions on the area of code that manages the image verification feature. An attacker could exploit this vulnerability by first authenticating to the targeted device and then logging in to the Virtual Device Server (VDS) of an affected device. The attacker could then, from the VDS shell, disable Cisco IOS Software integrity (image) verification. A successful exploit could allow the attacker to boot a malicious Cisco IOS Software image on the targeted device. To exploit this vulnerability, the attacker must have valid user credentials at privilege level 15.

EPSS

Процентиль: 17%
0.00055
Низкий

6.7 Medium

CVSS3

6.8 Medium

CVSS2