Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2020-02890

Опубликовано: 03 июн. 2020
Источник: fstec
CVSS3: 6
CVSS2: 4.3
EPSS Низкий

Описание

Уязвимость интерпретатора TCL-сценариев (Tool Command Language) операционных систем Cisco IOS и Cisco IOS XE связана с недостаточной проверкой вводимых данных. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco IOS
Cisco IOS XE

Версия ПО

12.2 (Cisco IOS)
12.4 (Cisco IOS)
15.0 (Cisco IOS)
15.2 (Cisco IOS)
15.3 (Cisco IOS)
15.1 (Cisco IOS)
16.1 (Cisco IOS XE)
16.2 (Cisco IOS XE)
16.3 (Cisco IOS XE)
3.2 (Cisco IOS XE)
3.3 (Cisco IOS XE)
3.4 (Cisco IOS XE)
3.5 (Cisco IOS XE)
3.6 (Cisco IOS XE)
3.7 (Cisco IOS XE)
3.8 (Cisco IOS XE)
3.9 (Cisco IOS XE)
3.10 (Cisco IOS XE)
3.11 (Cisco IOS XE)
3.12 (Cisco IOS XE)
3.13 (Cisco IOS XE)
3.14 (Cisco IOS XE)
3.15 (Cisco IOS XE)
3.16 (Cisco IOS XE)
3.17 (Cisco IOS XE)
3.18 (Cisco IOS XE)
16.4 (Cisco IOS XE)
16.5 (Cisco IOS XE)
16.6 (Cisco IOS XE)
16.7 (Cisco IOS XE)
16.8 (Cisco IOS XE)
16.9 (Cisco IOS XE)
16.10 (Cisco IOS XE)
16.11 (Cisco IOS XE)
16.12 (Cisco IOS XE)
12.3 (Cisco IOS)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Cisco Systems Inc. Cisco IOS 12.2
Cisco Systems Inc. Cisco IOS 12.4
Cisco Systems Inc. Cisco IOS 15.0
Cisco Systems Inc. Cisco IOS 15.2
Cisco Systems Inc. Cisco IOS 15.3
Cisco Systems Inc. Cisco IOS 15.1
Cisco Systems Inc. Cisco IOS XE 16.1
Cisco Systems Inc. Cisco IOS XE 16.2
Cisco Systems Inc. Cisco IOS XE 16.3
Cisco Systems Inc. Cisco IOS XE 3.2
Cisco Systems Inc. Cisco IOS XE 3.3
Cisco Systems Inc. Cisco IOS XE 3.4
Cisco Systems Inc. Cisco IOS XE 3.5
Cisco Systems Inc. Cisco IOS XE 3.6
Cisco Systems Inc. Cisco IOS XE 3.7
Cisco Systems Inc. Cisco IOS XE 3.8
Cisco Systems Inc. Cisco IOS XE 3.9
Cisco Systems Inc. Cisco IOS XE 3.10
Cisco Systems Inc. Cisco IOS XE 3.11
Cisco Systems Inc. Cisco IOS XE 3.12
Cisco Systems Inc. Cisco IOS XE 3.13
Cisco Systems Inc. Cisco IOS XE 3.14
Cisco Systems Inc. Cisco IOS XE 3.15
Cisco Systems Inc. Cisco IOS XE 3.16
Cisco Systems Inc. Cisco IOS XE 3.17
Cisco Systems Inc. Cisco IOS XE 3.18
Cisco Systems Inc. Cisco IOS XE 16.4
Cisco Systems Inc. Cisco IOS XE 16.5
Cisco Systems Inc. Cisco IOS XE 16.6
Cisco Systems Inc. Cisco IOS XE 16.7
Cisco Systems Inc. Cisco IOS XE 16.8
Cisco Systems Inc. Cisco IOS XE 16.9
Cisco Systems Inc. Cisco IOS XE 16.10
Cisco Systems Inc. Cisco IOS XE 16.11
Cisco Systems Inc. Cisco IOS XE 16.12
Cisco Systems Inc. Cisco IOS 12.3

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,3)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,2)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tcl-dos-MAZQUnMF

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 9%
0.00033
Низкий

6 Medium

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 6
nvd
больше 5 лет назад

A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker with privileged EXEC credentials to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient input validation of data passed to the Tcl interpreter. An attacker could exploit this vulnerability by executing crafted Tcl arguments on an affected device. An exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

CVSS3: 6
github
больше 3 лет назад

A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker with privileged EXEC credentials to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient input validation of data passed to the Tcl interpreter. An attacker could exploit this vulnerability by executing crafted Tcl arguments on an affected device. An exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

EPSS

Процентиль: 9%
0.00033
Низкий

6 Medium

CVSS3

4.3 Medium

CVSS2