code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(103695);
script_version("1.8");
script_cvs_date("Date: 2019/11/12");
script_cve_id("CVE-2017-12236");
script_bugtraq_id(101033);
script_xref(name:"CISCO-BUG-ID", value:"CSCvc18008");
script_xref(name:"CISCO-SA", value:"cisco-sa-20170927-lisp");
script_name(english:"Cisco IOS XE Software Locator/ID Separation Protocol Authentication Bypass Vulnerability");
script_summary(english:"Checks the Cisco IOS XE Software version.");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, the Cisco IOS XE Software is affected
by one or more vulnerabilities. Please see the included Cisco BIDs
and the Cisco Security Advisory for more information.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-lisp
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c4aab580");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvc18008");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCvc18008.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-12236");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/09/27");
script_set_attribute(attribute:"patch_publication_date", value:"2017/09/27");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/10/06");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cpe:/o:cisco:ios_xe");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ios_xe_version.nasl");
script_require_keys("Host/Cisco/IOS-XE/Version");
exit(0);
}
include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");
product_info = cisco::get_product_info(name:"Cisco IOS XE Software");
version_list = make_list(
"16.5.1c",
"3.2.0JA",
"3.9.1E"
);
workarounds = make_list(CISCO_WORKAROUNDS['include_map-server']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_HOLE,
'version' , product_info['version'],
'bug_id' , "CSCvc18008",
'cmds' , make_list("show running-config | include map-server")
);
cisco::check_and_report(product_info:product_info, workarounds:workarounds, workaround_params:workaround_params, reporting:reporting, vuln_versions:version_list);
|