code | #TRUSTED 08eaa5f3e46e414a1c427a0829bacc68104e96be7ca2a175b7b0a1738f02c24c2c0eb6b2b0991bd0246f77eb67d9526c3ff747b36a0640250e7f35a1b59cc0c5df9ffd72a1e72bb1a802ced752897633331e7dc7aff0c228a710d64adc371bb6a15b91566e8cae35c14d3fb80a1677cec82a11b490c6b5a92ba1e4bb8035e0891a82a2e221716e7bb67f23a0e7054366b890b951b3f36244ef7101879b88f3e66cc60270b5c7f8226258d76d55b664d1415e5c5bb69df7ecb36545201df02a91c5e75bdd135d44ed692cbee0326d688528c4f71d8d73e65e45135ff7ef49834e93520f8b37486faabfd718ad32cc9f250888f95ddb6fa6f2a7824497a418ea819ef6787b872a9854e4efe9f9de09c2a4ae3af3f18075ec26864eadb3c7c6ab2e862fd418b26a04855cffd0eb0e82c6d39d2a5d7a95761051aad87ba61b7580c6fdb87d34759d94829183325c0a40cfec8afa2b0b74583b0a94a645f49ad12b4cf3c3dd0f35d2968ada6ee425ee1b0225237c6e3496c78ee218c5c9f1aa9da377de8c0a01d8f011e7a87853f955be40d67a3630999e80082d2ddde71c6058050595011a294483c9390aa1952ababb15088c5bc2554fefc34f1a3c1b0fe59dcfad05cd53b52c07a661bc3e75c3f32a263461b74faf7461059743ea622b7317824b960c41df0305b9bb42acfbbb09f6a7310fbff1db85696e6c5a6cf86d156ddb71
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(117948);
script_version("1.8");
script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/27");
script_cve_id("CVE-2018-0472");
script_xref(name:"CISCO-BUG-ID", value:"CSCvg37952");
script_xref(name:"CISCO-BUG-ID", value:"CSCvh04189");
script_xref(name:"CISCO-BUG-ID", value:"CSCvh04591");
script_xref(name:"CISCO-SA", value:"cisco-sa-20180926-ipsec");
script_name(english:"Cisco IOS XE Software IPsec DoS Vulnerability (cisco-sa-20180926-ipsec)");
script_summary(english:"Checks the IOS XE version.");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, the IOS XE is affected
by one or more vulnerabilities. Please see the included Cisco BIDs
and the Cisco Security Advisory for more information.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ipsec
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6892abdc");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg37952");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh04189");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh04591");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCvg37952, CSCvh04189, and CSCvh04591.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-0472");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/09/26");
script_set_attribute(attribute:"patch_publication_date", value:"2018/09/26");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/10/05");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cpe:/o:cisco:ios_xe");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ios_xe_version.nasl");
script_require_keys("Host/Cisco/IOS-XE/Version");
exit(0);
}
include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");
product_info = cisco::get_product_info(name:"Cisco IOS XE Software");
model_list = make_list(
"ASR1001-X",
"ASR1001-HX",
"ASR1002-X",
"ASR1002-HX",
"ASR1000-ESP100",
"ASR1000-ESP200",
"ISR4431",
"ISR4431-X"
);
version_list = make_list(
"3.4.0S",
"3.4.1S",
"3.4.2S",
"3.4.3S",
"3.4.4S",
"3.4.5S",
"3.4.6S",
"3.4.0aS",
"3.4.7S",
"3.5.0S",
"3.5.1S",
"3.5.2S",
"3.6.0S",
"3.6.1S",
"3.6.2S",
"3.7.0S",
"3.7.1S",
"3.7.2S",
"3.7.3S",
"3.7.4S",
"3.7.5S",
"3.7.6S",
"3.7.7S",
"3.7.8S",
"3.7.4aS",
"3.7.2tS",
"3.7.0bS",
"3.8.0S",
"3.8.1S",
"3.8.2S",
"3.9.1S",
"3.9.0S",
"3.9.2S",
"3.9.1aS",
"3.9.0aS",
"3.10.0S",
"3.10.1S",
"3.10.2S",
"3.10.3S",
"3.10.4S",
"3.10.5S",
"3.10.6S",
"3.10.2aS",
"3.10.2tS",
"3.10.7S",
"3.10.8S",
"3.10.8aS",
"3.10.9S",
"3.10.10S",
"3.11.1S",
"3.11.2S",
"3.11.0S",
"3.11.3S",
"3.11.4S",
"3.12.0S",
"3.12.1S",
"3.12.2S",
"3.12.3S",
"3.12.0aS",
"3.12.4S",
"3.13.0S",
"3.13.1S",
"3.13.2S",
"3.13.3S",
"3.13.4S",
"3.13.5S",
"3.13.2aS",
"3.13.5aS",
"3.13.6S",
"3.13.7S",
"3.13.6aS",
"3.13.6bS",
"3.13.7aS",
"3.13.8S",
"3.13.9S",
"3.6.10E",
"3.14.0S",
"3.14.1S",
"3.14.2S",
"3.14.3S",
"3.14.4S",
"3.15.0S",
"3.15.1S",
"3.15.2S",
"3.15.1cS",
"3.15.3S",
"3.15.4S",
"3.16.0S",
"3.16.1S",
"3.16.1aS",
"3.16.2S",
"3.16.0bS",
"3.16.0cS",
"3.16.3S",
"3.16.2bS",
"3.16.4aS",
"3.16.4bS",
"3.16.4gS",
"3.16.5S",
"3.16.4cS",
"3.16.4dS",
"3.16.4eS",
"3.16.6S",
"3.16.5aS",
"3.16.5bS",
"3.16.7S",
"3.16.6bS",
"3.16.7aS",
"3.16.7bS",
"3.17.0S",
"3.17.1S",
"3.17.2S ",
"3.17.1aS",
"3.17.3S",
"3.17.4S",
"16.1.1",
"16.1.2",
"16.1.3",
"3.2.0JA",
"16.2.1",
"16.2.2",
"16.3.1",
"16.3.2",
"16.3.3",
"16.3.1a",
"16.3.4",
"16.3.5",
"16.3.5b",
"16.3.6",
"16.4.1",
"16.4.2",
"16.4.3",
"16.5.1",
"16.5.1a",
"16.5.1b",
"16.5.2",
"16.5.3",
"3.18.6SP",
"16.6.1",
"16.6.2",
"16.6.3",
"16.7.1",
"16.7.1a",
"16.7.1b",
"16.8.1",
"16.8.1s",
"16.9.1b",
"16.9.1h"
);
workarounds = make_list(CISCO_WORKAROUNDS['crypto_map'], CISCO_WORKAROUNDS['tunnel_ipsec'], CISCO_WORKAROUNDS['ospfv3_ipsec']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_HOLE,
'version' , product_info['version'],
'bug_id' , "CSCvg37952, CSCvh04189, and CSCvh04591",
'cmds' , make_list("show running-config")
);
cisco::check_and_report(product_info:product_info, workarounds:workarounds, workaround_params:workaround_params, reporting:reporting, vuln_versions:version_list, models:model_list);
|