code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(102362);
script_version("1.8");
script_cvs_date("Date: 2019/12/20");
script_cve_id("CVE-2017-6617");
script_bugtraq_id(97929);
script_xref(name:"CISCO-BUG-ID", value:"CSCvd14583");
script_xref(name:"CISCO-SA", value:"cisco-sa-20170419-cimc2");
script_name(english:"Cisco Integrated Management Controller User Session Hijacking Vulnerability");
script_summary(english:"Checks the Cisco Unified Computing System (Management Software) version.");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, the Cisco Unified Computing System (Management Software) is affected
by one or more vulnerabilities. Please see the included Cisco BIDs
and the Cisco Security Advisory for more information.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-cimc2
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2c704912");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvd14583");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCvd14583.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-6617");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/04/19");
script_set_attribute(attribute:"patch_publication_date", value:"2017/04/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/08/10");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cpe:/a:cisco:integrated_management_controller");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_imc_detect.nbin");
script_require_keys("Host/Cisco/CIMC/version");
exit(0);
}
include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");
product_info = cisco::get_product_info(name:"Cisco Unified Computing System (Management Software)");
version_list = make_list(
"3.0(1)c"
);
workarounds = make_list(CISCO_WORKAROUNDS['no_workaround']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_WARNING,
'version' , product_info['version'],
'bug_id' , "CSCvd14583",
'fix' , 'See advisory'
);
cisco::check_and_report(product_info:product_info, workarounds:workarounds, workaround_params:workaround_params, reporting:reporting, vuln_versions:version_list);
|