code | #TRUSTED 0b294e0a2df1cbffe2ff286e0347c0b590d156983de9b8ee62b0418912b32289103811dc0046e3486d1029a0a179f4ca4d964c1cf9771d61dcc130e3d0b558bffa470f0423946f9370b884ee24d251e9a0e5063028887c968e7d894648feba2cb197f318bb1d895255208c049e8a359ff5abbca39566b5eec5f4bd7a630b2b43575b2433e406f6c39d95dbbc4eeca74a4bd3de6911d53ec903e18a6a58065da799d9614bb7528ac64973c7440acfcbb3fed66ee8a130481ef4cdd464c4676ee45d8f074bc6ebd28d84ef960c5a8f9fd7e0c94f7abb37ce0508138971ccb10efeebba4cd84b75b34f003e13727a399f641b17de389ecae23264982e1e3d6bd0bec80351fde249ccef52d50ecb7607ea6fabbf47f549d142b1ee74bb89333cf41738c9f7a7f8463a772ecea37cd0d8fd5becb99f44234e1532f4371f329f949bd902e50c05e4d39bce082c094db8366bd2d095bfcc6732b24fded01d1c6d86e90ff28bc3920ebeca1f9dc819351cf7846bfa5cbc2dc88fb7c7c4875b5a99f443b88ebf1e1c0128905d311b6c663d4625235526c742cab7de5f711277f859ac1aec938da826f82c68371af139b662208f6acc90321d951656e8d22c27796f20638238457538f57830c7a562432d1840be9fc0fe00ef88aec0fbd7107f549da34d98c64a368b8b684f428aa274381d4ff02a79022d4cbc9a99ed8a1b8dd31b0034c1
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(129530);
script_version("1.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/08");
script_cve_id("CVE-2019-12664");
script_xref(name:"CISCO-BUG-ID", value:"CSCvk42668");
script_xref(name:"CISCO-SA", value:"cisco-sa-20190925-isdn-data-leak");
script_xref(name:"IAVA", value:"2019-A-0352-S");
script_name(english:"Cisco IOS XE Software ISDN Data Leak Vulnerability");
script_summary(english:"Checks the version of Cisco IOS XE Software");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco IOS XE Software is affected by a data leak vulnerability.
Please see the included Cisco BIDs and Cisco Security Advisory for more information");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-isdn-data-leak
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?32058d0a");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk42668");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvk42668");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-12664");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_cwe_id(200);
script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/25");
script_set_attribute(attribute:"patch_publication_date", value:"2019/09/25");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/10/03");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios_xe");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ios_xe_version.nasl");
script_require_keys("Host/Cisco/IOS-XE/Version", "Settings/ParanoidReport");
exit(0);
}
include('audit.inc');
include('cisco_workarounds.inc');
include('ccf.inc');
if (report_paranoia < 2) audit(AUDIT_PARANOID);
product_info = cisco::get_product_info(name:'Cisco IOS XE Software');
version_list=make_list(
'3.6.5bE',
'3.4.6SG',
'3.4.5SG',
'3.2.9SG',
'3.2.11aSG',
'3.2.0JA',
'3.18.4SP',
'3.18.4S',
'3.18.3bSP',
'3.18.3aSP',
'3.18.3SP',
'3.14.0S',
'3.13.9S',
'3.13.1S',
'16.9.3h',
'16.9.1s',
'16.9.1d',
'16.9.1c',
'16.9.1b',
'16.9.1a',
'16.9.1',
'16.8.3',
'16.8.2',
'16.8.1s',
'16.8.1e',
'16.8.1d',
'16.8.1c',
'16.8.1b',
'16.8.1a',
'16.8.1',
'16.7.4',
'16.7.3',
'16.7.2',
'16.7.1b',
'16.7.1a',
'16.7.1',
'16.6.4s',
'16.6.4a',
'16.6.4',
'16.6.3',
'16.6.2',
'16.6.1'
);
workarounds = make_list(CISCO_WORKAROUNDS['no_workaround']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_WARNING,
'version' , product_info['version'],
'bug_id' , 'CSCvk42668'
);
cisco::check_and_report(product_info:product_info, workarounds:workarounds, workaround_params:workaround_params, reporting:reporting, vuln_versions:version_list);
|