Lucene search

K
nessusThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO-SA-20140326-IKEV2.NASL
HistoryApr 04, 2014 - 12:00 a.m.

Cisco IOS Software Internet Key Exchange Version 2 (IKEv2) Denial of Service (cisco-sa-20140326-ikev2)

2014-04-0400:00:00
This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
43

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

56.2%

According to its self-reported version, the version of Cisco IOS running on the remote host is affected by a denial of service vulnerability in the Internet Key Exchange Version 2 (IKEv2) module.
An unauthenticated, remote attacker could potentially exploit this issue by sending a malformed IKEv2 packet resulting in a denial of service.

Note that this issue only affects hosts when Internet Security Association and Key Management Protocol (ISAKMP) is enabled.

#TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(73341);
  script_version("1.18");
  script_cvs_date("Date: 2019/11/26");

  script_cve_id("CVE-2014-2108");
  script_bugtraq_id(66471);
  script_xref(name:"CISCO-BUG-ID", value:"CSCui88426");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20140326-ikev2");

  script_name(english:"Cisco IOS Software Internet Key Exchange Version 2 (IKEv2) Denial of Service (cisco-sa-20140326-ikev2)");
  script_summary(english:"Checks the IOS version.");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, the version of Cisco IOS
running on the remote host is affected by a denial of service
vulnerability in the Internet Key Exchange Version 2 (IKEv2) module.
An unauthenticated, remote attacker could potentially exploit this
issue by sending a malformed IKEv2 packet resulting in a denial of
service.

Note that this issue only affects hosts when Internet Security
Association and Key Management Protocol (ISAKMP) is enabled.");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ec115086");
  script_set_attribute(attribute:"see_also", value:"https://tools.cisco.com/security/center/viewAlert.x?alertId=33346");
  script_set_attribute(attribute:"solution", value:
"Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20140326-ikev2.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/03/26");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/01/10");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/04/04");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_ios_version.nasl");
  script_require_keys("Host/Cisco/IOS/Version");

  exit(0);
}


include("audit.inc");
include("cisco_func.inc");
include("cisco_kb_cmd_func.inc");

flag = 0;
override = 0;
report = "";
cbi = "CSCui88426";
fixed_ver = "";

ver = get_kb_item_or_exit("Host/Cisco/IOS/Version");

# 15.0ED
if (ver == '15.0(2)ED' || ver == '15.0(2)ED1')
         fixed_ver = '15.2(1)E2';
# 15.0EH
else if (ver == '15.0(2)EH')
         fixed_ver = '15.2(1)E2';
# 15.0EJ
else if (ver == '15.0(2)EJ')
         fixed_ver = '15.0(2)EJ1';
# 15.0EX
else if (ver == '15.0(2)EX' || ver == '15.0(2)EX1' || ver == '15.0(2)EX3' || ver == '15.0(2)EX4')
         fixed_ver = 'Refer to the vendor for a fix.';
# 15.0EY
else if (ver == '15.0(2)EY' || ver == '15.0(2)EY1' || ver == '15.0(2)EY3')
         fixed_ver = '15.2(1)E2';
# 15.0EZ
else if (ver == '15.0(2)EZ')
         fixed_ver = '15.0(2)SE6';
# 15.0SE
else if (ver == '15.0(2)SE' || ver == '15.0(2)SE1' || ver == '15.0(2)SE2' || ver == '15.0(2)SE3' || ver == '15.0(2)SE4' || ver == '15.0(2)SE5')
         fixed_ver = '15.0(2)SE6';
# 15.1GC
else if (ver == '15.1(2)GC' || ver == '15.1(2)GC1' || ver == '15.1(2)GC2' || ver == '15.1(4)GC' || ver == '15.1(4)GC1' || ver == '15.1(4)GC2')
         fixed_ver = '15.2(4)GC1';
# 15.1M
else if (ver == '15.1(4)M' || ver == '15.1(4)M0a' || ver == '15.1(4)M0b' || ver == '15.1(4)M1' || ver == '15.1(4)M2' || ver == '15.1(4)M3' || ver == '15.1(4)M3a' || ver == '15.1(4)M4' || ver == '15.1(4)M5' || ver == '15.1(4)M6' || ver == '15.1(4)M7')
         fixed_ver = '15.1(4)M8';
# 15.1MR
else if (ver == '15.1(1)MR' || ver == '15.1(1)MR1' || ver == '15.1(1)MR2' || ver == '15.1(1)MR3' || ver == '15.1(1)MR4' || ver == '15.1(1)MR5' || ver == '15.1(1)MR6' || ver == '15.1(3)MR')
         fixed_ver = 'Refer to the vendor for a fix.';
# 15.1MRA
else if (ver == '15.1(3)MRA' || ver == '15.1(3)MRA1' || ver == '15.1(3)MRA2')
         fixed_ver = '15.1(3)MRA3';
# 15.1S
else if (ver == '15.1(1)S' || ver == '15.1(1)S1' || ver == '15.1(1)S2' || ver == '15.1(2)S' || ver == '15.1(2)S1' || ver == '15.1(2)S2' || ver == '15.1(3)S' || ver == '15.1(3)S0a' || ver == '15.1(3)S1' || ver == '15.1(3)S2' || ver == '15.1(3)S3' || ver == '15.1(3)S4' || ver == '15.1(3)S5' || ver == '15.1(3)S5a' || ver == '15.1(3)S6')
         fixed_ver = '15.2(2)S0a or 15.2(4)S5';
# 15.1SG
else if (ver == '15.1(1)SG' || ver == '15.1(1)SG1' || ver == '15.1(1)SG2' || ver == '15.1(2)SG' || ver == '15.1(2)SG1' || ver == '15.1(2)SG2' || ver == '15.1(2)SG3')
         fixed_ver = '15.1(2)SG4';
# 15.1SNG
else if (ver == '15.1(2)SNG')
         fixed_ver = 'Refer to the vendor for a fix.';
# 15.1SNH
else if (ver == '15.1(2)SNH' || ver == '15.1(2)SNH1')
         fixed_ver = 'Refer to the vendor for a fix.';
# 15.1SNI
else if (ver == '15.1(2)SNI' || ver == '15.1(2)SNI1')
         fixed_ver = 'Refer to the vendor for a fix.';
# 15.1SY
else if (ver == '15.1(1)SY' || ver == '15.1(1)SY1' || ver == '15.1(1)SY2' || ver == '15.1(2)SY' || ver == '15.1(2)SY1')
         fixed_ver = '15.1(1)SY3 or 15.1(2)SY2';
# 15.1T
else if (ver == '15.1(1)T' || ver == '15.1(1)T1' || ver == '15.1(1)T2' || ver == '15.1(1)T3' || ver == '15.1(1)T4' || ver == '15.1(1)T5' || ver == '15.1(2)T' || ver == '15.1(2)T0a' || ver == '15.1(2)T1' || ver == '15.1(2)T2' || ver == '15.1(2)T2a' || ver == '15.1(2)T3' || ver == '15.1(2)T4' || ver == '15.1(2)T5' || ver == '15.1(3)T' || ver == '15.1(3)T1' || ver == '15.1(3)T2' || ver == '15.1(3)T3' || ver == '15.1(3)T4')
         fixed_ver = '15.1(4)M8';
# 15.1XB - no fix specified
else if (ver == '15.1(1)XB1' || ver == '15.1(1)XB2' || ver == '15.1(1)XB3' || ver == '15.1(4)XB4' || ver == '15.1(4)XB5' || ver == '15.1(4)XB5a' || ver == '15.1(4)XB6' || ver == '15.1(4)XB7' || ver == '15.1(4)XB8' || ver == '15.1(4)XB8a')
       fixed_ver = 'Refer to the vendor for a fix.';
# 15.2E
else if (ver == '15.2(1)E' || ver == '15.2(1)E1')
        fixed_ver = '15.2(1)E2';
# 15.2EY
else if (ver == '15.2(1)EY')
        fixed_ver = '15.2(1)E2';
# 15.2GC
else if (ver == '15.2(1)GC' || ver == '15.2(1)GC1' || ver == '15.2(1)GC2' || ver == '15.2(2)GC' || ver == '15.2(3)GC' || ver == '15.2(3)GC1' || ver == '15.2(4)GC')
        fixed_ver = '15.2(4)GC1';
# 15.2GCA - no fix specified
else if (ver == '15.2(3)GCA' || ver == '15.2(3)GCA1')
        fixed_ver = 'Refer to the vendor for a fix.';
# 15.2M
else if (ver == '15.2(4)M' || ver == '15.2(4)M1' || ver == '15.2(4)M2' || ver == '15.2(4)M3' || ver == '15.2(4)M4' || ver == '15.2(4)M5')
        fixed_ver = '15.2(4)M6';
# 15.2S
else if (ver == '15.2(1)S' || ver == '15.2(1)S1' || ver == '15.2(1)S2' || ver == '15.2(2)S' || ver == '15.2(2)S1' || ver == '15.2(2)S2' || ver == '15.2(4)S' || ver == '15.2(4)S1' || ver == '15.2(4)S2' || ver == '15.2(4)S3' || ver == '15.2(4)S3a' || ver == '15.2(4)S4' || ver == '15.2(4)S4a')
        fixed_ver = '15.2(2)S0a or 15.2(4)S5';
# 15.2SNG
else if (ver == '15.2(2)SNG')
        fixed_ver = 'Refer to the vendor for a fix.';
# 15.2SNH
else if (ver == '15.2(2)SNH' || ver == '15.2(2)SNH1')
        fixed_ver = 'Refer to the vendor for a fix.';
# 15.2SNI
else if (ver == '15.2(2)SNI')
        fixed_ver = 'Refer to the vendor for a fix.';
# 15.2T
else if (ver == '15.2(1)T' || ver == '15.2(1)T1' || ver == '15.2(1)T2' || ver == '15.2(1)T3' || ver == '15.2(1)T3a' || ver == '15.2(1)T4' || ver == '15.2(2)T' || ver == '15.2(2)T1' || ver == '15.2(2)T2' || ver == '15.2(2)T3' || ver == '15.2(2)T4' || ver == '15.2(3)T' || ver == '15.2(3)T1' ||   ver == '15.2(3)T2' || ver == '15.2(3)T3' || ver == '15.2(3)T4')
        fixed_ver = '15.2(4)M6';
# 15.2XA - no fix specified
else if (ver == '15.2(3)XA')
        fixed_ver = 'Refer to the vendor for a fix.';
# 15.2XB - no fix specified
else if (ver == '15.2(4)XB10')
        fixed_ver = 'Refer to the vendor for a fix.';
# 15.3M
else if (ver == '15.3(3)M')
        fixed_ver = '15.3(3)M1';
# 15.3S
else if (ver == '15.3(1)S' || ver == '15.3(1)S1' || ver == '15.3(1)S2' || ver == '15.3(2)S' || ver == '15.3(2)S0a' || ver == '15.3(2)S0xa' || ver == '15.3(2)S1' || ver == '15.3(2)S2' || ver == '15.3(3)S')
        fixed_ver = '15.3(3)S1';

if (fixed_ver) flag++;

if (flag && get_kb_item("Host/local_checks_enabled"))
{
  flag = 0;

  buf = cisco_command_kb_item("Host/Cisco/Config/show_running-config", "show running-config");
  if (check_cisco_result(buf))
  {
    if (preg(multiline:TRUE, pattern:"^crypto map", string:buf)) { flag = 1; }
    if (preg(multiline:TRUE, pattern:"^tunnel protection ipsec", string:buf)) { flag = 1; }
  } else if (cisco_needs_enable(buf)) { flag = 1; override = 1; }
}

if (flag)
{
  report +=
    '\n  Cisco Bug ID        : ' + cbi +
    '\n    Installed release : ' + ver +
    '\n    Fixed release     : ' + fixed_ver + '\n';
  security_hole(port:0, extra:report + cisco_caveat(override));
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

56.2%