Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2021-01958

Опубликовано: 24 мар. 2021
Источник: fstec
CVSS3: 6.7
CVSS2: 6.8
EPSS Низкий

Описание

Уязвимость функции быстрой перезагрузки микропрограммного обеспечения коммутаторов Cisco Catalyst 3650, Cisco Catalyst 3850, Cisco Catalyst 9300 и Cisco Catalyst 9300L Series связана с некорректной проверкой криптографической подписи. Эксплуатация уязвимости может позволить нарушителю выполнить произвольный код

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco IOS XE

Версия ПО

16.5 (Cisco IOS XE)
16.5 (Cisco IOS XE)
16.5 (Cisco IOS XE)
16.5 (Cisco IOS XE)
16.6 (Cisco IOS XE)
16.6 (Cisco IOS XE)
16.6 (Cisco IOS XE)
16.6 (Cisco IOS XE)
16.8 (Cisco IOS XE)
16.8 (Cisco IOS XE)
16.8 (Cisco IOS XE)
16.8 (Cisco IOS XE)
16.9 (Cisco IOS XE)
16.9 (Cisco IOS XE)
16.9 (Cisco IOS XE)
16.9 (Cisco IOS XE)
16.1 (Cisco IOS XE)
16.1 (Cisco IOS XE)
16.1 (Cisco IOS XE)
16.1 (Cisco IOS XE)
16.11 (Cisco IOS XE)
16.11 (Cisco IOS XE)
16.11 (Cisco IOS XE)
16.11 (Cisco IOS XE)
16.12 (Cisco IOS XE)
16.12 (Cisco IOS XE)
16.12 (Cisco IOS XE)
16.12 (Cisco IOS XE)
от 17.1 до 17.2 включительно (Cisco IOS XE)
от 17.1 до 17.2 включительно (Cisco IOS XE)
от 17.1 до 17.2 включительно (Cisco IOS XE)
от 17.1 до 17.2 включительно (Cisco IOS XE)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Cisco Systems Inc. Cisco IOS XE 16.5
Cisco Systems Inc. Cisco IOS XE 16.5
Cisco Systems Inc. Cisco IOS XE 16.5
Cisco Systems Inc. Cisco IOS XE 16.5
Cisco Systems Inc. Cisco IOS XE 16.6
Cisco Systems Inc. Cisco IOS XE 16.6
Cisco Systems Inc. Cisco IOS XE 16.6
Cisco Systems Inc. Cisco IOS XE 16.6
Cisco Systems Inc. Cisco IOS XE 16.8
Cisco Systems Inc. Cisco IOS XE 16.8
Cisco Systems Inc. Cisco IOS XE 16.8
Cisco Systems Inc. Cisco IOS XE 16.8
Cisco Systems Inc. Cisco IOS XE 16.9
Cisco Systems Inc. Cisco IOS XE 16.9
Cisco Systems Inc. Cisco IOS XE 16.9
Cisco Systems Inc. Cisco IOS XE 16.9
Cisco Systems Inc. Cisco IOS XE 16.1
Cisco Systems Inc. Cisco IOS XE 16.1
Cisco Systems Inc. Cisco IOS XE 16.1
Cisco Systems Inc. Cisco IOS XE 16.1
Cisco Systems Inc. Cisco IOS XE 16.11
Cisco Systems Inc. Cisco IOS XE 16.11
Cisco Systems Inc. Cisco IOS XE 16.11
Cisco Systems Inc. Cisco IOS XE 16.11
Cisco Systems Inc. Cisco IOS XE 16.12
Cisco Systems Inc. Cisco IOS XE 16.12
Cisco Systems Inc. Cisco IOS XE 16.12
Cisco Systems Inc. Cisco IOS XE 16.12
Cisco Systems Inc. Cisco IOS XE от 17.1 до 17.2 включительно
Cisco Systems Inc. Cisco IOS XE от 17.1 до 17.2 включительно
Cisco Systems Inc. Cisco IOS XE от 17.1 до 17.2 включительно
Cisco Systems Inc. Cisco IOS XE от 17.1 до 17.2 включительно

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,8)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 6,7)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 6%
0.00025
Низкий

6.7 Medium

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.7
nvd
почти 5 лет назад

Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory.

github
больше 3 лет назад

Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory.

EPSS

Процентиль: 6%
0.00025
Низкий

6.7 Medium

CVSS3

6.8 Medium

CVSS2