Lucene search

K
nessusThis script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO-SA-ASAFTD-IPV6-67PA658K-ASA.NASL
HistoryJun 19, 2020 - 12:00 a.m.

Cisco Adaptive Security Appliance (ASA) IPV6 DNS DoS (cisco-sa-asaftd-ipv6-67pA658k)

2020-06-1900:00:00
This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
16

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

EPSS

0.002

Percentile

52.7%

According to its self-reported version, Cisco Adaptive Security Appliance (ASA) Software is affected by a denial of service (DoS) vulnerability in its DNS over IPV6 implementation due to insufficient user input validation. An unauthenticated, remote attacker can exploit this issue, by sending a specially crafted DNS IPV6 query to an affected host, to cause a DoS condition.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version

#TRUSTED a70d031d36bec0bd88a9da4a5562875b0856c7d41608503b59c9d89b5af6b2642d353793fc6b7f4d83fc59ed608212e761c8d20abd34e5946d392d388eddcb6724ba39f9b310023ebceacd944199a8d6934739002e197113984ad231161efb90c560083b597d1193d62f59d5cccdb05a0a0b13c39022640197f9f1ab835af9e395b62a00fe3e2fda8389f2a5c319694c8d0a313dbbb5b70d4493403002c687960894b85946d1f1dc7c260a6c817cbccb76564b8e18ef091f22b1139720ac7cfb5db3389de57ca0ac232714eb1ac3b18ccf9a035018bb00a36eebfaf364ce6df31fa1954ad1a256849cb56debed02ad26738604ea49e2f450aa5118651b76e5b01cb938a7bb1953f922cd39fe1ae81ebb12e5a3af431c0ae6ca3344d40f9dc26af2e7fe6690dce375f8d38499ac7f690bde27463be40364e848852fc770d554c34de95e868c6c63d103b33c83b73b99763b59bdd25e71fc182e2b990a825a1ec5dfc9a49512c4ea710a6680b0f643e1e6fdc464318c67a6a84964cb8636f390ceb989cc8e5b0ee1cb008b8052f055cfd0676d6e00d36c0bdaa878ec8565657ee5dd819170d3de2867082372d2228ffbfed781cef31d1e5ab88a9dd019109b53397686abfa70ef7703c946068c6dc7e4deb1c21a0699d18d36481db7ca8fce6640e25534dade6efcd80d3fa9e00fff5800bdf643dbd77dcf9b556e163314ba58b9
#TRUST-RSA-SHA256 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
#
# (C) Tenable Network Security, Inc.
#

include('compat.inc');

if (description)
{
  script_id(137661);
  script_version("1.11");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/03/31");

  script_cve_id("CVE-2020-3191");
  script_xref(name:"CISCO-BUG-ID", value:"CSCvr07419");
  script_xref(name:"CISCO-SA", value:"cisco-sa-asaftd-ipv6-67pA658k");
  script_xref(name:"IAVA", value:"2020-A-0205-S");
  script_xref(name:"CEA-ID", value:"CEA-2020-0042");

  script_name(english:"Cisco Adaptive Security Appliance (ASA) IPV6 DNS DoS (cisco-sa-asaftd-ipv6-67pA658k)");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco Adaptive Security Appliance (ASA) Software is affected by a denial of 
  service (DoS) vulnerability in its DNS over IPV6 implementation due to insufficient user input validation. An 
  unauthenticated, remote attacker can exploit this issue, by sending a specially crafted DNS IPV6 query to an affected
  host, to cause a DoS condition.

  Please see the included Cisco BIDs and Cisco Security Advisory for more information.
  
  Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported 
  version");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ipv6-67pA658k
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f09a07e9");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr07419");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvr07419.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-3191");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2020/05/06");
  script_set_attribute(attribute:"patch_publication_date", value:"2020/05/05");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/06/19");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:adaptive_security_appliance_software");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl", "os_fingerprint.nasl");
  script_require_keys("Host/Cisco/ASA");

  exit(0);
}

include('ccf.inc');
include('cisco_workarounds.inc');

product_info = cisco::get_product_info(name:'Cisco Adaptive Security Appliance (ASA) Software');

vuln_ranges = [
  {'min_ver' : '0.0',  'fix_ver' : '9.6.4.36'},
  {'min_ver' : '9.7',  'fix_ver' : '9.8.4.12'},
  {'min_ver' : '9.9',  'fix_ver' : '9.9.2.66'},
  {'min_ver' : '9.10',  'fix_ver' : '9.10.1.37'},
  {'min_ver' : '9.12',  'fix_ver' : '9.12.2.9'}
];

workarounds = make_list(CISCO_WORKAROUNDS['dns_non_local_routes']);

reporting = make_array(
  'port'     , 0,
  'severity' , SECURITY_WARNING,
  'version'  , product_info['version'],
  'bug_id'   , 'CSCvr07419',
  'cmds'     , make_list('show ipv6 route summary')
);

cisco::check_and_report(
  product_info:product_info,
  workarounds:workarounds,
  reporting:reporting,
  vuln_ranges:vuln_ranges
);

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

EPSS

0.002

Percentile

52.7%

Related for CISCO-SA-ASAFTD-IPV6-67PA658K-ASA.NASL