Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2020-03354

Опубликовано: 02 июл. 2020
Источник: fstec
CVSS3: 8.1
CVSS2: 10
EPSS Низкий

Описание

Уязвимость веб-интерфейса управления микропрограммного обеспечения маршрутизаторов Cisco Small Business Smart и Managed Switches связана с ошибками аутентификации. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, повысить свои привилегии

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco Small Business 200 Series Smart Switches
Cisco Small Business 500 Series Stackable Managed Switches
Cisco 250 Series Smart Switches
Cisco 350 Series Managed Switches
Cisco 350X Series Stackable Managed Switches
Cisco 550X Series Stackable Managed Switches
Cisco Small Business 300 Series Managed Switches

Версия ПО

- (Cisco Small Business 200 Series Smart Switches)
- (Cisco Small Business 500 Series Stackable Managed Switches)
до 2.5.5.47 (Cisco 250 Series Smart Switches)
до 2.5.5.47 (Cisco 350 Series Managed Switches)
до 2.5.5.47 (Cisco 350X Series Stackable Managed Switches)
до 2.5.5.47 (Cisco 550X Series Stackable Managed Switches)
- (Cisco Small Business 300 Series Managed Switches)

Тип ПО

ПО сетевого программно-аппаратного средства

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Критический уровень опасности (базовая оценка CVSS 2.0 составляет 10)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 8,1)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbswitch-session-JZAS5jnY

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 90%
0.0541
Низкий

8.1 High

CVSS3

10 Critical

CVSS2

Связанные уязвимости

CVSS3: 9.8
nvd
больше 5 лет назад

A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.

github
больше 3 лет назад

A vulnerability in session management for the web-based interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to defeat authentication protections and gain unauthorized access to the management interface. The attacker could obtain the privileges of the highjacked session account, which could include administrator privileges on the device. The vulnerability is due to the use of weak entropy generation for session identifier values. An attacker could exploit this vulnerability to determine a current session identifier through brute force and reuse that session identifier to take over an ongoing session. In this way, an attacker could take actions within the management interface with privileges up to the level of the administrative user.

EPSS

Процентиль: 90%
0.0541
Низкий

8.1 High

CVSS3

10 Critical

CVSS2