Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2021-01806

Опубликовано: 24 мар. 2021
Источник: fstec
CVSS3: 7.8
CVSS2: 6.8
EPSS Низкий

Описание

Уязвимость интерфейса командной строки (CLI) операционных систем Cisco IOS XE и Cisco IOS связана с недостаточной защитой регистрационных данных. Эксплуатация уязвимости может позволить нарушителю получить пароль для Common Industrial Protocol (CIP) и перенастроить устройство

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco IOS XE
Cisco IOS

Версия ПО

3.3XO (Cisco IOS XE)
3.7E (Cisco IOS XE)
16.9 (Cisco IOS XE)
16.10 (Cisco IOS XE)
16.11 (Cisco IOS XE)
17.2 (Cisco IOS XE)
3.6E (Cisco IOS XE)
15.0EY (Cisco IOS)
15.2JAZ (Cisco IOS)
15.3JAA (Cisco IOS)
15.3JN (Cisco IOS)
15.3JA (Cisco IOS)
15.3JB (Cisco IOS)
15.3JNB (Cisco IOS)
15.3JAX (Cisco IOS)
15.3JBB (Cisco IOS)
15.3JC (Cisco IOS)
15.3JNC (Cisco IOS)
15.3JNP (Cisco IOS)
15.3JPB (Cisco IOS)
15.3JD (Cisco IOS)
15.3JPC (Cisco IOS)
15.3JND (Cisco IOS)
15.3JE (Cisco IOS)
15.3JPD (Cisco IOS)
15.3JF (Cisco IOS)
15.3JG (Cisco IOS)
15.3JH (Cisco IOS)
15.3JI (Cisco IOS)
15.3JJ (Cisco IOS)
15.2E (Cisco IOS)
16.12 (Cisco IOS XE)
15.2EY (Cisco IOS)
15.2EB (Cisco IOS)
15.2EA (Cisco IOS)
15.2EC (Cisco IOS)
15.1SVS (Cisco IOS)
17.1 (Cisco IOS XE)
15.3JK (Cisco IOS)
15.1SVT (Cisco IOS)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Cisco Systems Inc. Cisco IOS XE 3.3XO
Cisco Systems Inc. Cisco IOS XE 3.7E
Cisco Systems Inc. Cisco IOS XE 16.9
Cisco Systems Inc. Cisco IOS XE 16.10
Cisco Systems Inc. Cisco IOS XE 16.11
Cisco Systems Inc. Cisco IOS XE 17.2
Cisco Systems Inc. Cisco IOS XE 3.6E
Cisco Systems Inc. Cisco IOS 15.0EY
Cisco Systems Inc. Cisco IOS 15.2JAZ
Cisco Systems Inc. Cisco IOS 15.3JAA
Cisco Systems Inc. Cisco IOS 15.3JN
Cisco Systems Inc. Cisco IOS 15.3JA
Cisco Systems Inc. Cisco IOS 15.3JB
Cisco Systems Inc. Cisco IOS 15.3JNB
Cisco Systems Inc. Cisco IOS 15.3JAX
Cisco Systems Inc. Cisco IOS 15.3JBB
Cisco Systems Inc. Cisco IOS 15.3JC
Cisco Systems Inc. Cisco IOS 15.3JNC
Cisco Systems Inc. Cisco IOS 15.3JNP
Cisco Systems Inc. Cisco IOS 15.3JPB
Cisco Systems Inc. Cisco IOS 15.3JD
Cisco Systems Inc. Cisco IOS 15.3JPC
Cisco Systems Inc. Cisco IOS 15.3JND
Cisco Systems Inc. Cisco IOS 15.3JE
Cisco Systems Inc. Cisco IOS 15.3JPD
Cisco Systems Inc. Cisco IOS 15.3JF
Cisco Systems Inc. Cisco IOS 15.3JG
Cisco Systems Inc. Cisco IOS 15.3JH
Cisco Systems Inc. Cisco IOS 15.3JI
Cisco Systems Inc. Cisco IOS 15.3JJ
Cisco Systems Inc. Cisco IOS 15.2E
Cisco Systems Inc. Cisco IOS XE 16.12
Cisco Systems Inc. Cisco IOS 15.2EY
Cisco Systems Inc. Cisco IOS 15.2EB
Cisco Systems Inc. Cisco IOS 15.2EA
Cisco Systems Inc. Cisco IOS 15.2EC
Cisco Systems Inc. Cisco IOS 15.1SVS
Cisco Systems Inc. Cisco IOS XE 17.1
Cisco Systems Inc. Cisco IOS 15.3JK
Cisco Systems Inc. Cisco IOS 15.1SVT

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,8)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7,8)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-SAP-OPLbze68

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 8%
0.0003
Низкий

7.8 High

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.8
nvd
почти 5 лет назад

A vulnerability in the CLI command permissions of Cisco IOS and Cisco IOS XE Software could allow an authenticated, local attacker to retrieve the password for Common Industrial Protocol (CIP) and then remotely configure the device as an administrative user. This vulnerability exists because incorrect permissions are associated with the show cip security CLI command. An attacker could exploit this vulnerability by issuing the command to retrieve the password for CIP on an affected device. A successful exploit could allow the attacker to reconfigure the device.

github
больше 3 лет назад

A vulnerability in the CLI command permissions of Cisco IOS and Cisco IOS XE Software could allow an authenticated, local attacker to retrieve the password for Common Industrial Protocol (CIP) and then remotely configure the device as an administrative user. This vulnerability exists because incorrect permissions are associated with the show cip security CLI command. An attacker could exploit this vulnerability by issuing the command to retrieve the password for CIP on an affected device. A successful exploit could allow the attacker to reconfigure the device.

EPSS

Процентиль: 8%
0.0003
Низкий

7.8 High

CVSS3

6.8 Medium

CVSS2