Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2020-02885

Опубликовано: 03 июн. 2020
Источник: fstec
CVSS3: 8.8
CVSS2: 6.8
EPSS Низкий

Описание

Уязвимость виртуальной консоли операционной системы Cisco IOS связана с использованием предустановленных учетных данных. Эксплуатация уязвимости может позволить нарушителю получить доступ к системе и выполнять произвольные команды с привилегиями root

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco IOS

Версия ПО

15.6(1)T0a (Cisco IOS)
15.5(3)M (Cisco IOS)
15.5(1)T (Cisco IOS)
15.5(2)T (Cisco IOS)
15.5(1)T3 (Cisco IOS)
15.5(2)T1 (Cisco IOS)
15.5(2)T2 (Cisco IOS)
15.5(2)T3 (Cisco IOS)
15.5(2)T4 (Cisco IOS)
15.5(1)T4 (Cisco IOS)
15.5(3)M1 (Cisco IOS)
15.5(3)M2 (Cisco IOS)
15.5(3)M3 (Cisco IOS)
15.5(3)M4 (Cisco IOS)
15.5(3)M4a (Cisco IOS)
15.5(3)M5 (Cisco IOS)
15.5(3)M6 (Cisco IOS)
15.5(3)M6a (Cisco IOS)
15.6(1)T (Cisco IOS)
15.6(2)T (Cisco IOS)
15.6(1)T1 (Cisco IOS)
15.6(2)T1 (Cisco IOS)
15.6(1)T2 (Cisco IOS)
15.6(2)T2 (Cisco IOS)
15.6(1)T3 (Cisco IOS)
15.6(2)T3 (Cisco IOS)
15.6(3)M (Cisco IOS)
15.6(3)M1 (Cisco IOS)
15.6(3)M0a (Cisco IOS)
15.6(3)M1b (Cisco IOS)
15.6(3)M2 (Cisco IOS)
15.6(3)M3 (Cisco IOS)
15.6(3)M3a (Cisco IOS)
15.7(3)M (Cisco IOS)
15.3(3)JAA1 (Cisco IOS)
15.5(1)T2 (Cisco IOS)
15.4(3)M6a (Cisco IOS)
15.4(3)M7 (Cisco IOS)
15.4(3)M6 (Cisco IOS)
15.4(3)M5 (Cisco IOS)
15.4(3)M4 (Cisco IOS)
15.6(3)M6 (Cisco IOS)
15.7(3)M3 (Cisco IOS)
15.8(3)M (Cisco IOS)
15.8(3)M0a (Cisco IOS)
15.5(3)M2a (Cisco IOS)
15.4(3)M (Cisco IOS)
15.4(3)M1 (Cisco IOS)
15.4(3)M2 (Cisco IOS)
15.4(3)M3 (Cisco IOS)
15.4(3)M8 (Cisco IOS)
15.4(3)M9 (Cisco IOS)
15.4(3)M10 (Cisco IOS)
15.5(1)T1 (Cisco IOS)
15.5(3)M7 (Cisco IOS)
15.5(3)M8 (Cisco IOS)
15.6(3)M4 (Cisco IOS)
15.6(3)M5 (Cisco IOS)
15.7(3)M1 (Cisco IOS)
15.7(3)M2 (Cisco IOS)
15.4(1)CG (Cisco IOS)
15.4(2)CG (Cisco IOS)
12.2(60)EZ16 (Cisco IOS)
15.0(2)SG11a (Cisco IOS)
15.5(3)M9 (Cisco IOS)
15.5(3)M10 (Cisco IOS)
15.5(3)M11 (Cisco IOS)
15.6(3)M7 (Cisco IOS)
15.6(3)M6a (Cisco IOS)
15.6(3)M6b (Cisco IOS)
15.6(3)M8 (Cisco IOS)
15.6(3)M9 (Cisco IOS)
15.7(3)M4 (Cisco IOS)
15.7(3)M5 (Cisco IOS)
15.7(3)M4a (Cisco IOS)
15.7(3)M4b (Cisco IOS)
15.7(3)M6 (Cisco IOS)
15.7(3)M7 (Cisco IOS)
15.8(3)M1 (Cisco IOS)
15.8(3)M2 (Cisco IOS)
15.8(3)M3 (Cisco IOS)
15.8(3)M2a (Cisco IOS)
15.8(3)M4 (Cisco IOS)
15.8(3)M3a (Cisco IOS)
15.8(3)M3b (Cisco IOS)
15.8(3)M5 (Cisco IOS)
15.3(3)JPJ (Cisco IOS)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Cisco Systems Inc. Cisco IOS 15.6(1)T0a
Cisco Systems Inc. Cisco IOS 15.5(3)M
Cisco Systems Inc. Cisco IOS 15.5(1)T
Cisco Systems Inc. Cisco IOS 15.5(2)T
Cisco Systems Inc. Cisco IOS 15.5(1)T3
Cisco Systems Inc. Cisco IOS 15.5(2)T1
Cisco Systems Inc. Cisco IOS 15.5(2)T2
Cisco Systems Inc. Cisco IOS 15.5(2)T3
Cisco Systems Inc. Cisco IOS 15.5(2)T4
Cisco Systems Inc. Cisco IOS 15.5(1)T4
Cisco Systems Inc. Cisco IOS 15.5(3)M1
Cisco Systems Inc. Cisco IOS 15.5(3)M2
Cisco Systems Inc. Cisco IOS 15.5(3)M3
Cisco Systems Inc. Cisco IOS 15.5(3)M4
Cisco Systems Inc. Cisco IOS 15.5(3)M4a
Cisco Systems Inc. Cisco IOS 15.5(3)M5
Cisco Systems Inc. Cisco IOS 15.5(3)M6
Cisco Systems Inc. Cisco IOS 15.5(3)M6a
Cisco Systems Inc. Cisco IOS 15.6(1)T
Cisco Systems Inc. Cisco IOS 15.6(2)T
Cisco Systems Inc. Cisco IOS 15.6(1)T1
Cisco Systems Inc. Cisco IOS 15.6(2)T1
Cisco Systems Inc. Cisco IOS 15.6(1)T2
Cisco Systems Inc. Cisco IOS 15.6(2)T2
Cisco Systems Inc. Cisco IOS 15.6(1)T3
Cisco Systems Inc. Cisco IOS 15.6(2)T3
Cisco Systems Inc. Cisco IOS 15.6(3)M
Cisco Systems Inc. Cisco IOS 15.6(3)M1
Cisco Systems Inc. Cisco IOS 15.6(3)M0a
Cisco Systems Inc. Cisco IOS 15.6(3)M1b
Cisco Systems Inc. Cisco IOS 15.6(3)M2
Cisco Systems Inc. Cisco IOS 15.6(3)M3
Cisco Systems Inc. Cisco IOS 15.6(3)M3a
Cisco Systems Inc. Cisco IOS 15.7(3)M
Cisco Systems Inc. Cisco IOS 15.3(3)JAA1
Cisco Systems Inc. Cisco IOS 15.5(1)T2
Cisco Systems Inc. Cisco IOS 15.4(3)M6a
Cisco Systems Inc. Cisco IOS 15.4(3)M7
Cisco Systems Inc. Cisco IOS 15.4(3)M6
Cisco Systems Inc. Cisco IOS 15.4(3)M5
Cisco Systems Inc. Cisco IOS 15.4(3)M4
Cisco Systems Inc. Cisco IOS 15.6(3)M6
Cisco Systems Inc. Cisco IOS 15.7(3)M3
Cisco Systems Inc. Cisco IOS 15.8(3)M
Cisco Systems Inc. Cisco IOS 15.8(3)M0a
Cisco Systems Inc. Cisco IOS 15.5(3)M2a
Cisco Systems Inc. Cisco IOS 15.4(3)M
Cisco Systems Inc. Cisco IOS 15.4(3)M1
Cisco Systems Inc. Cisco IOS 15.4(3)M2
Cisco Systems Inc. Cisco IOS 15.4(3)M3
Cisco Systems Inc. Cisco IOS 15.4(3)M8
Cisco Systems Inc. Cisco IOS 15.4(3)M9
Cisco Systems Inc. Cisco IOS 15.4(3)M10
Cisco Systems Inc. Cisco IOS 15.5(1)T1
Cisco Systems Inc. Cisco IOS 15.5(3)M7
Cisco Systems Inc. Cisco IOS 15.5(3)M8
Cisco Systems Inc. Cisco IOS 15.6(3)M4
Cisco Systems Inc. Cisco IOS 15.6(3)M5
Cisco Systems Inc. Cisco IOS 15.7(3)M1
Cisco Systems Inc. Cisco IOS 15.7(3)M2
Cisco Systems Inc. Cisco IOS 15.4(1)CG
Cisco Systems Inc. Cisco IOS 15.4(2)CG
Cisco Systems Inc. Cisco IOS 12.2(60)EZ16
Cisco Systems Inc. Cisco IOS 15.0(2)SG11a
Cisco Systems Inc. Cisco IOS 15.5(3)M9
Cisco Systems Inc. Cisco IOS 15.5(3)M10
Cisco Systems Inc. Cisco IOS 15.5(3)M11
Cisco Systems Inc. Cisco IOS 15.6(3)M7
Cisco Systems Inc. Cisco IOS 15.6(3)M6a
Cisco Systems Inc. Cisco IOS 15.6(3)M6b
Cisco Systems Inc. Cisco IOS 15.6(3)M8
Cisco Systems Inc. Cisco IOS 15.6(3)M9
Cisco Systems Inc. Cisco IOS 15.7(3)M4
Cisco Systems Inc. Cisco IOS 15.7(3)M5
Cisco Systems Inc. Cisco IOS 15.7(3)M4a
Cisco Systems Inc. Cisco IOS 15.7(3)M4b
Cisco Systems Inc. Cisco IOS 15.7(3)M6
Cisco Systems Inc. Cisco IOS 15.7(3)M7
Cisco Systems Inc. Cisco IOS 15.8(3)M1
Cisco Systems Inc. Cisco IOS 15.8(3)M2
Cisco Systems Inc. Cisco IOS 15.8(3)M3
Cisco Systems Inc. Cisco IOS 15.8(3)M2a
Cisco Systems Inc. Cisco IOS 15.8(3)M4
Cisco Systems Inc. Cisco IOS 15.8(3)M3a
Cisco Systems Inc. Cisco IOS 15.8(3)M3b
Cisco Systems Inc. Cisco IOS 15.8(3)M5
Cisco Systems Inc. Cisco IOS 15.3(3)JPJ

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,8)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 8,6)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-vds-cred-uPMp9zbY

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 14%
0.00046
Низкий

8.8 High

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.8
nvd
больше 5 лет назад

A vulnerability in the virtual console authentication of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an authenticated but low-privileged, local attacker to log in to the Virtual Device Server (VDS) of an affected device by using a set of default credentials. The vulnerability is due to the presence of weak, hard-coded credentials. An attacker could exploit this vulnerability by authenticating to the targeted device and then connecting to VDS through the device’s virtual console by using the static credentials. A successful exploit could allow the attacker to access the Linux shell of VDS as the root user.

CVSS3: 8.8
github
больше 3 лет назад

A vulnerability in the virtual console authentication of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an authenticated but low-privileged, local attacker to log in to the Virtual Device Server (VDS) of an affected device by using a set of default credentials. The vulnerability is due to the presence of weak, hard-coded credentials. An attacker could exploit this vulnerability by authenticating to the targeted device and then connecting to VDS through the device’s virtual console by using the static credentials. A successful exploit could allow the attacker to access the Linux shell of VDS as the root user.

EPSS

Процентиль: 14%
0.00046
Низкий

8.8 High

CVSS3

6.8 Medium

CVSS2