code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(103670);
script_version("1.11");
script_cvs_date("Date: 2019/11/12");
script_cve_id("CVE-2017-12235");
script_bugtraq_id(101043);
script_xref(name:"CISCO-BUG-ID", value:"CSCuz47179");
script_xref(name:"CISCO-SA", value:"cisco-sa-20170927-profinet");
script_name(english:"Cisco IOS Software PROFINET denial of service (cisco-sa-20170927-profinet)");
script_summary(english:"Checks the IOS version.");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version and configuration, the Cisco
IOS software running on the remote device is affected by a denial of
service vulnerability in the PROFINET Discovery and Configuration
Protocol (PN-DCP) feature. An unauthenticated, remote attacker can
exploit this, via specially crafted PN-DCP requests, to cause the
switch to stop processing traffic, requiring a device restart to
regain functionality.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-profinet
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9b66383b");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCuz47179.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-12235");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/09/27");
script_set_attribute(attribute:"patch_publication_date", value:"2017/09/27");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/10/05");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ios_version.nasl");
script_require_keys("Host/Cisco/IOS/Version");
exit(0);
}
include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");
product_info = cisco::get_product_info(name:"Cisco IOS");
version_list = make_list(
'12.2(55)SE',
'15.0(1)EY',
'12.2(55)SE3',
'12.2(52)SE',
'12.2(58)SE',
'12.2(52)SE1',
'15.0(2)SE',
'12.2(58)SE1',
'12.2(55)SE4',
'12.2(58)SE2',
'12.2(55)SE5',
'12.2(55)SE6',
'15.0(2)SE1',
'15.0(1)EY1',
'15.0(2)SE2',
'15.0(2)EC',
'15.0(2)EB',
'12.2(55)SE7',
'15.2(2)E',
'15.0(1)EY2',
'15.0(2)EY',
'15.0(2)SE3',
'15.0(2)EY1',
'15.0(2)SE4',
'15.2(1)EY',
'15.0(2)SE5',
'15.0(2)EY2',
'12.2(55)SE9',
'15.0(2)EA1',
'15.0(2)EY3',
'15.0(2)SE6',
'15.2(2)EB',
'15.2(1)EY1',
'12.4(25e)JAO3a',
'12.4(25e)JAO20s',
'12.2(55)SE10',
'15.3(3)JN',
'15.2(2)E1',
'15.1(4)M11',
'15.0(2)SE7',
'15.2(2b)E',
'15.2(3)E1',
'15.2(2)E2',
'15.3(3)SA',
'15.2(2)E3',
'12.4(25e)JAP3',
'12.4(25e)JAO5m',
'15.0(2)SE8',
'15.0(2)SE9',
'15.1(4)M12',
'15.2(2a)E2',
'15.2(3)E2',
'15.2(2)EA1',
'15.2(2)EA2',
'15.2(3)EA',
'15.2(3)EA1',
'15.2(1)EY2',
'15.2(2)JA3',
'15.2(4)JB8',
'15.3(3)JAX3',
'15.3(3)JN5',
'15.4(3)SN2',
'15.5(2)SN0a',
'15.2(3)E3',
'15.2(2)EB1',
'15.5(3)SN1',
'15.3(3)JN6',
'15.3(3)JBB3',
'15.2(4)EA',
'12.2(55)SE11',
'15.2(2)E4',
'15.2(4)EA1',
'15.2(2)E5',
'12.4(25e)JAP1n',
'15.3(3)JBB7',
'15.3(3)JC30',
'15.2(3)E2a',
'15.5(3)S2a',
'15.3(3)JBB6a',
'15.0(2)SE10',
'15.2(3)EX',
'15.3(3)JPB',
'15.2(3)E4',
'15.2(2)EA3',
'15.2(2)EB2',
'15.3(3)JNP2',
'15.6(2)S0a',
'15.2(4)EA3',
'15.4(3)S5a',
'15.5(3)S2b',
'15.6(1)S1a',
'12.4(25e)JAP9',
'15.2(4)EC',
'15.1(2)SG7a',
'15.5(3)S3a',
'15.3(3)JC50',
'15.3(3)JC51',
'15.6(2)S2',
'15.3(3)JN10',
'15.2(4)EB',
'15.2(2)E6',
'15.2(4)EA4',
'15.2(4)EA2',
'15.3(3)JPB2',
'15.5(3)S4a',
'15.2(2)E5a',
'15.5(3)S4b',
'15.2(3)E5',
'15.0(2)SE10a',
'15.2(4)EA5',
'15.2(2)E5b',
'15.2(5a)E1',
'15.6(2)SP1b',
'15.5(3)S4d',
'15.6(2)SP1c',
'15.2(4a)EA5',
'15.5(3)S4e',
'15.1(2)SG9',
'15.3(3)JPC3',
'15.3(3)JDA3',
'15.5(3)S5a',
'15.4(3)S6b',
'15.4(3)S7a',
'15.3(3)JNC4',
'15.4(3)M7a',
'15.5(3)S5b',
'15.6(2)S3',
'15.3(3)JC7',
'15.6(2)SP2a',
'15.3(3)JND2',
'15.3(3)JCA7',
'15.0(2)SQD7',
'15.2(5)E2a',
'15.2(5)E2b',
'15.3(3)JE1',
'15.3(3)JN12'
);
workarounds = make_list(CISCO_WORKAROUNDS['profinet']);
reporting = make_array(
'port' , 0,
'severity' , SECURITY_HOLE,
'version' , product_info['version'],
'bug_id' , 'CSCuz47179',
'cmds' , make_list('show running-config')
);
cisco::check_and_report(product_info:product_info, workarounds:workarounds, reporting:reporting, vuln_versions:version_list);
|