code |
include("compat.inc");
if (description)
{
script_id(128684);
script_version("1.7");
script_cvs_date("Date: 2020/02/14");
script_cve_id("CVE-2019-1851");
script_bugtraq_id(108356);
script_xref(name:"CISCO-BUG-ID", value:"CSCvm81230");
script_xref(name:"CISCO-SA", value:"cisco-sa-20190515-ise-certcreation");
script_name(english:"Cisco Identity Services Engine Arbitrary Client Certificate Creation Vulnerability");
script_summary(english:"Checks the version of Cisco Identity Services Engine Software");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
script_set_attribute(attribute:"description", value:
"A vulnerability in the External RESTful Services (ERS) API of the
Cisco Identity Services Engine (ISE) could allow an authenticated,
remote attacker to generate arbitrary certificates signed by the
InternalCertificate Authority (CA) Services on ISE. This
vulnerability is due to an incorrect implementation of role-based
access control (RBAC). An attacker could exploit this vulnerability
by crafting a specific HTTP request with administrative credentials.
A successful exploit could allow the attacker to generate a
certificate that is signed and trusted by the ISE CA with arbitrary
attributes. The attacker could use this certificate to access other
networks or assets that are protected by certificate authentication.
Please see the included Cisco BIDs and Cisco Security Advisory for
more information");
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?980cfdbf");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm81230");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCvm81230");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-1851");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_cwe_id(285);
script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/15");
script_set_attribute(attribute:"patch_publication_date", value:"2019/05/15");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/09/11");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:identity_services_engine");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ise_detect.nbin");
script_require_keys("Host/Cisco/ISE/version", "Settings/ParanoidReport");
exit(0);
}
include('audit.inc');
include('cisco_workarounds.inc');
include('ccf.inc');
include('lists.inc');
product_info = cisco::get_product_info(name:'Cisco Identity Services Engine Software');
if (report_paranoia < 2) audit(AUDIT_PARANOID);
vuln_ranges = [
{ 'min_ver' : '0.0', 'fix_ver' : '2.2.0.470' },
{ 'min_ver' : '2.3.0', 'fix_ver' : '2.3.0.298' },
{ 'min_ver' : '2.4.0', 'fix_ver' : '2.4.0.357' }
];
workarounds = make_list(CISCO_WORKAROUNDS['no_workaround']);
workaround_params = make_list();
required_patch = '';
if (product_info['version'] =~ "^2\.2\.0($|[^0-9])") required_patch = '15';
else if (product_info['version'] =~ "^2\.3\.0($|[^0-9])") required_patch = '7';
else if (product_info['version'] =~ "^2\.4\.0($|[^0-9])") required_patch = '8';
reporting = make_array(
'port' , 0,
'severity' , SECURITY_WARNING,
'version' , product_info['version'],
'bug_id' , 'CSCvm81230',
'fix' , 'See advisory'
);
cisco::check_and_report(
product_info:product_info,
reporting:reporting,
workarounds:workarounds,
workaround_params:workaround_params,
vuln_ranges:vuln_ranges,
required_patch:required_patch);
|