code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(128877);
script_version("1.7");
script_cvs_date("Date: 2019/12/20");
script_cve_id("CVE-2018-0378");
script_bugtraq_id(105669);
script_xref(name:"CISCO-BUG-ID", value:"CSCvg21830");
script_xref(name:"CISCO-SA", value:"cisco-sa-20181017-nexus-ptp-dos");
script_name(english:"Cisco NX-OS Precision Time Protocol (PTP) Denial of Service Vulnerability");
script_summary(english:"Checks the Cisco NX-OS Software version.");
script_set_attribute(attribute:"synopsis", value:
"The remote Cisco device is affected by a denial of service vulnerability");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, the Cisco NX-OS Software is affected
by a denial of service (DoS) vulnerability which exists in its Precision Time Protocol (PTP) implementation due to a
lack of protection against PTP frame flood attacks. An unauthenticated, remote attacker can exploit this issue, by
sending large streams of malicious PTP traffic to the device, to cause the system to stop responding.
Please see the included Cisco BIDs and the Cisco Security Advisory for more information.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-nexus-ptp-dos
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e46fc38e");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg21830");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCvg21830.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-0378");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/10/17");
script_set_attribute(attribute:"patch_publication_date", value:"2018/12/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/09/17");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_nxos_version.nasl");
script_require_keys("Host/Cisco/NX-OS/Device", "Host/Cisco/NX-OS/Version", "Host/Cisco/NX-OS/Model");
exit(0);
}
include('audit.inc');
include('cisco_workarounds.inc');
include('ccf.inc');
device = get_kb_item_or_exit('Host/Cisco/NX-OS/Device');
model = get_kb_item_or_exit('Host/Cisco/NX-OS/Model');
version = get_kb_item_or_exit('Host/Cisco/NX-OS/Version');
if ('Nexus' >!< device || model !~ '^5[56][0-9]{2}|6[0-9]{3}')
audit(AUDIT_HOST_NOT, 'an affected device and/or model');
product_info = cisco::get_product_info(name:'Cisco NX-OS Software');
version_list = make_list(
'6.0(2)N1(2)',
'6.0(2)N1(2a)',
'6.0(2)N2(1)',
'6.0(2)N2(1b)',
'6.0(2)N2(2)',
'6.0(2)N2(3)',
'6.0(2)N2(4)',
'6.0(2)N2(5)',
'7.0(0)N1(1)',
'7.0(1)N1(1)',
'7.0(2)N1(1)',
'7.0(3)N1(1)',
'7.0(6)N1(1)',
'7.1(1)N1(1)',
'6.0(2)N2(5a)',
'6.0(2)N2(6)',
'6.0(2)N2(7)',
'7.0(4)N1(1)',
'7.0(5)N1(1)',
'7.0(5)N1(1a)',
'7.0(7)N1(1)',
'7.1(0)N1(1a)',
'7.1(0)N1(1b)',
'7.1(2)N1(1)',
'7.1(3)N1(1)',
'7.2(0)N1(1)',
'7.2(1)N1(1)',
'4.2(1)N1(1)',
'4.2(1)N2(1)',
'4.2(1)N2(1a)',
'5.0(2)N1(1)',
'5.0(2)N2(1)',
'5.0(2)N2(1a)',
'5.0(3)N1(1)',
'5.0(3)N1(1a)',
'5.0(3)N1(1b)',
'5.0(3)N1(1c)',
'5.0(3)N2(1)',
'5.0(3)N2(2)',
'5.0(3)N2(2a)',
'5.0(3)N2(2b)',
'5.1(3)N1(1)',
'5.1(3)N1(1a)',
'5.1(3)N2(1)',
'5.1(3)N2(1a)',
'5.1(3)N2(1b)',
'5.1(3)N2(1c)',
'5.2(1)N1(1)',
'5.2(1)N1(1a)',
'5.2(1)N1(1b)',
'5.2(1)N1(2)',
'5.2(1)N1(2a)',
'5.2(1)N1(3)',
'5.2(1)N1(4)',
'5.2(1)N1(5)',
'5.2(1)N1(6)',
'5.2(1)N1(7)',
'5.2(1)N1(8)',
'5.2(1)N1(8a)',
'5.2(1)N1(8b)',
'5.2(1)N1(9)',
'5.2(1)N1(9a)',
'5.2(1)N1(9b)',
'6.0(2)N1(1)',
'7.0(8)N1(1)',
'7.1(0)N1(1)',
'7.1(3)N1(2)',
'7.1(4)N1(1)',
'7.1(5)N1(1)',
'7.3(0)N1(1)',
'7.3(1)N1(1)',
'7.3(2)N1(1)',
'7.3(1)N1(1)',
'7.3(2)N1(1)',
'7.3(0)N1(1b)',
'7.3(0)N1(1a)',
'7.3(0)N1(1)',
'7.2(1)N1(1)',
'7.2(0)N1(1)',
'7.1(5)N1(1)',
'7.1(4)N1(1d)',
'7.1(4)N1(1c)',
'7.1(4)N1(1a)',
'7.1(4)N1(1)',
'7.1(3)N1(5)',
'7.1(3)N1(4)',
'7.1(3)N1(3)',
'7.1(3)N1(2a)',
'7.1(3)N1(2)',
'7.1(3)N1(1b)',
'7.1(3)N1(1)',
'7.1(2)N1(1a)',
'7.1(2)N1(1)',
'7.1(1)N1(1a)',
'7.1(1)N1(1)',
'7.1(0)N1(2)',
'7.1(0)N1(1b)',
'7.1(0)N1(1a)',
'7.1(0)N1(1)',
'7.0(8)N1(1a)',
'7.0(8)N1(1)',
'7.0(7)N1(1b)',
'7.0(7)N1(1a)',
'7.0(7)N1(1)',
'7.0(6)N1(4s)',
'7.0(6)N1(3s)',
'7.0(6)N1(2s)',
'7.0(6)N1(1c)',
'7.0(6)N1(1)',
'7.0(5)N1(1a)',
'7.0(5)N1(1)',
'7.0(4)N1(1a)',
'7.0(4)N1(1)',
'7.0(3)N1(1)',
'7.0(2)N1(1a)',
'7.0(2)N1(1)',
'7.0(0)N1(1)',
'7.0(1)N1(1)',
'4.2(1)N1(1)',
'4.2(1)N2(1)',
'4.2(1)N2(1a)',
'5.0(2)N1(1)',
'5.0(2)N2(1)',
'5.0(2)N2(1a)',
'5.0(3)N1(1)',
'5.0(3)N1(1a)',
'5.0(3)N1(1b)',
'5.0(3)N1(1c)',
'5.0(3)N2(1)',
'5.0(3)N2(2)',
'5.0(3)N2(2a)',
'5.0(3)N2(2b)',
'5.1(3)N1(1)',
'5.1(3)N1(1a)',
'5.1(3)N2(1)',
'5.1(3)N2(1a)',
'5.1(3)N2(1b)',
'5.1(3)N2(1c)',
'5.2(1)N1(1)',
'5.2(1)N1(1a)',
'5.2(1)N1(1b)',
'5.2(1)N1(2)',
'5.2(1)N1(2a)',
'5.2(1)N1(3)',
'5.2(1)N1(4)',
'5.2(1)N1(5)',
'5.2(1)N1(6)',
'5.2(1)N1(7)',
'5.2(1)N1(8)',
'5.2(1)N1(8a)',
'5.2(1)N1(8b)',
'5.2(1)N1(9)',
'5.2(1)N1(9a)',
'5.2(1)N1(9b)',
'6.0(2)N1(1)',
'6.0(2)N1(2)',
'6.0(2)N1(2a)',
'6.0(2)N2(1)',
'6.0(2)N2(1b)',
'6.0(2)N2(2)',
'6.0(2)N2(3)',
'6.0(2)N2(4)',
'6.0(2)N2(5)',
'6.0(2)N2(5a)',
'6.0(2)N2(6)',
'6.0(2)N2(7)',
'7.1(4)N1(1e)'
);
workarounds = make_list(CISCO_WORKAROUNDS['ptp_clock']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_HOLE,
'version' , product_info['version'],
'bug_id' , 'CSCvg21830',
'cmds' , make_list('show ptp clock')
);
cisco::check_and_report(
product_info:product_info,
workarounds:workarounds,
workaround_params:workaround_params,
reporting:reporting,
vuln_versions:version_list,
switch_only:TRUE
);
|