Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO-SA-DNAC-MULTIPLE-KTQKGU3_CVE-2023-20184.NASL
HistoryMay 19, 2023 - 12:00 a.m.

Cisco DNA Center Information Disclosure (cisco-sa-dnac-multiple-kTQkGU3)

2023-05-1900:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
9
cisco
dna center
information disclosure
vulnerability
api
access control

0.001 Low

EPSS

Percentile

23.8%

The version of Cisco DNA Center installed on the remote host is prior to 2.3.3.5. It is, therefore, affected by an information disclosure vulnerability. Due to improper authorization of API requests, a remote attacker with low privileges can send a specific API request to an affected device to read information from a restricted container that would normally only be accessible to high-privileged users.

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(176105);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/05/29");

  script_cve_id("CVE-2023-20184");
  script_xref(name:"CISCO-BUG-ID", value:"CSCwd58450");
  script_xref(name:"CISCO-SA", value:"cisco-sa-dnac-multiple-kTQkGU3");

  script_name(english:"Cisco DNA Center Information Disclosure (cisco-sa-dnac-multiple-kTQkGU3)");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"The version of Cisco DNA Center installed on the remote host is prior to 2.3.3.5. It is, therefore, affected by an
information disclosure vulnerability. Due to improper authorization of API requests, a remote attacker with low
privileges can send a specific API request to an affected device to read information from a restricted container that
would normally only be accessible to high-privileged users.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
  # https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-multiple-kTQkGU3
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ecd7b7ca");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd58450");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwd58450");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-20184");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2023/05/17");
  script_set_attribute(attribute:"patch_publication_date", value:"2023/05/17");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/05/19");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:digital_network_architecture_center");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_dna_center_web_detect.nbin");
  script_require_keys("installed_sw/Cisco DNA Center");

  exit(0);
}

include('vcf.inc');

var app_info = vcf::combined_get_app_info(app:'Cisco DNA Center');

vcf::check_granularity(app_info:app_info, sig_segments:4);
var constraints = [
  {'fixed_version': '2.2.3.5'}
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
VendorProductVersionCPE
ciscodigital_network_architecture_centercpe:/a:cisco:digital_network_architecture_center

0.001 Low

EPSS

Percentile

23.8%

Related for CISCO-SA-DNAC-MULTIPLE-KTQKGU3_CVE-2023-20184.NASL