code | #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(123788);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/08");
script_cve_id("CVE-2018-15371");
script_xref(name:"CISCO-BUG-ID", value:"CSCvb79289");
script_xref(name:"CISCO-SA", value:"cisco-sa-20180926-shell-access");
script_xref(name:"IAVA", value:"2019-A-0097-S");
script_name(english:"Cisco IOS XE Software Shell Access Authentication Bypass (cisco-sa-20180926-shell-access)");
script_summary(english:"Checks the IOS XE version.");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco IOS XE Software is affected
by the following vulnerability:
- An Authentication bypass in the shell access request
mechanism. An authenticated attacker could exploit this
in order to bypass authentication and gain root access
to the system. (CVE-2018-15371)");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-shell-access
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c0b2b2c9");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvb79289");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCvb79289.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-15371");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/09/26");
script_set_attribute(attribute:"patch_publication_date", value:"2018/09/26");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/04/05");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cpe:/o:cisco:ios_xe");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ios_xe_version.nasl");
script_require_keys("Host/Cisco/IOS-XE/Version");
exit(0);
}
include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");
product_info = cisco::get_product_info(name:"Cisco IOS XE Software");
# Checking models with regex, since ccf only does explicit ver list
#
# 4000 Series Integrated Services Routers
# ASR 900 Series Aggregation Services Routers
# ASR 1000 Series Aggregation Services Routers
# Cloud Services Router 1000V Series
# Integrated Services Virtual Router
#
model = get_kb_item_or_exit("Host/Cisco/IOS-XE/Model");
if(
model !~ "^ASR9\d{2}([^0-9]|$)" &&
model !~ "^ASR1k" &&
model !~ "^ASR10\d{2}([^0-9]|$)" &&
model !~ "^ASR9\d{3}([^0-9]|$)" &&
model !~ "^ISR4\d{3}([^0-9]|$)" &&
model !~ "^CSR10\d{2}([^0-9]|$)"
)
audit(AUDIT_DEVICE_NOT_VULN, model);
version_list = make_list(
"3.17.0S",
"3.17.1aS",
"3.17.1S",
"3.17.2S ",
"3.17.3S",
"3.17.4S",
"3.18.0aS",
"3.18.0S",
"3.18.0SP",
"3.18.1aSP",
"3.18.1bSP",
"3.18.1cSP",
"3.18.1gSP",
"3.18.1hSP",
"3.18.1iSP",
"3.18.1S",
"3.18.1SP",
"3.18.2aSP",
"3.18.2S",
"3.18.2SP",
"3.18.3aSP",
"3.18.3bSP",
"3.18.3S",
"3.18.3SP",
"3.18.4S",
"3.18.4SP",
"3.2.0JA",
"16.2.1",
"16.2.2",
"16.3.1",
"16.3.1a",
"16.9.1b"
);
workarounds = make_list(CISCO_WORKAROUNDS['smart_license']);
reporting = make_array(
'port' , 0,
'severity' , SECURITY_HOLE,
'version' , product_info['version'],
'bug_id' , "CSCvb79289",
'cmds' , make_list("show running-config")
);
cisco::check_and_report(product_info:product_info, workarounds:workarounds, reporting:reporting, vuln_versions:version_list);
|