CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
81.5%
According to its self-reported version, Cisco IOS-XE Software is affected by a vulnerability.
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
#TRUSTED 6d0d86bd5f6f30107bca3abe0968be5df56f6ba55c9c4680b0f36d4e6e6a55aa50e1436d8b6382fa2a62b8ba32aee2ca3ecbd3d2de57cfd6981a69fb9f14b6aba1ba6baec8d70224d971755d2626a5d0b2675b04fffbc1fb46fec8b6187229a15ce9202d4a19356fde67aae7c424490f677363cb44f0c4ca54f75739812e014196463f821f93082710d5f39c8e026475075c101d18933fdcf704b66b9f10742db241036ea1512bbace207c001b3aa1efb683341e40cc471665ea40fa8082509deb7c2c68b89b8d527fd363e78e869697a74ae4d3becc880ced70f1341ffc9cfbdd0a14fdbc9de5681332ba879950382e9f8344a6641ec09d2c8a47781d067014dd7eb122be0812965a2ae0a147f625eeee60d52ac513a0f7d346ce460ee3e9f9785fa567c021b988e6fea2ab65e711458da9024531a9fd389e9b0723de90cf69f1bee2ba7cab0fa6ca4a6807a48986a337b380c3d6768a77922ed746012ed0f6300ab7668adfda931cbbb8bc1292a9a0938d143ede2c6b71c8f44102dd80a52ea0dec98de7572b3f55658516062aad988cb9695282e4108fc79714c8b217e6262eb0256157a721e6fea343d7e0fb546ebb5a4d3d1d2038a8abbc36277e650ca88266a6c51821a39c73c87c548921e695fc4d310c8066dadb18654f9b38a46c6713fa3c1b369bb1a0af20b4b8c6e1bb97fa7a9a3d7f06ec1cd97fdf33b78d9aca
#TRUST-RSA-SHA256 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
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(183214);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/10/18");
script_cve_id("CVE-2023-20109");
script_xref(name:"CISCO-BUG-ID", value:"CSCwe14195");
script_xref(name:"CISCO-BUG-ID", value:"CSCwe24118");
script_xref(name:"CISCO-BUG-ID", value:"CSCwf49531");
script_xref(name:"CISCO-SA", value:"cisco-sa-getvpn-rce-g8qR68sx");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2023/10/31");
script_name(english:"Cisco IOS XE Software Group Encrypted Transport VPN Out of Bounds Write (cisco-sa-getvpn-rce-g8qR68sx)");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco IOS-XE Software is affected by a vulnerability.
- A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and
Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of
either a group member or a key server to execute arbitrary code on an affected device or cause the device
to crash. This vulnerability is due to insufficient validation of attributes in the Group Domain of
Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this
vulnerability by either compromising an installed key server or modifying the configuration of a group
member to point to a key server that is controlled by the attacker. A successful exploit could allow the
attacker to execute arbitrary code and gain full control of the affected system or cause the affected
system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details
[#details] section of this advisory. (CVE-2023-20109)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.");
# https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-getvpn-rce-g8qR68sx
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?cf42c207");
# https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74916
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f3520ae2");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe14195");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe24118");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf49531");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwe14195, CSCwe24118, CSCwf49531");
script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:M/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-20109");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/09/27");
script_set_attribute(attribute:"patch_publication_date", value:"2023/09/27");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/10/17");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios_xe");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ios_xe_version.nasl");
script_require_keys("Host/Cisco/IOS-XE/Version");
exit(0);
}
include('cisco_workarounds.inc');
include('ccf.inc');
var product_info = cisco::get_product_info(name:'Cisco IOS XE Software');
var version_list=make_list(
'3.3.0SG',
'3.3.1SG',
'3.3.2SG',
'3.4.0SG',
'3.4.1SG',
'3.4.2SG',
'3.4.3SG',
'3.4.4SG',
'3.4.5SG',
'3.4.6SG',
'3.4.7SG',
'3.4.8SG',
'3.5.0E',
'3.5.1E',
'3.5.2E',
'3.5.3E',
'3.6.0E',
'3.6.0aE',
'3.6.0bE',
'3.6.1E',
'3.6.2E',
'3.6.2aE',
'3.6.3E',
'3.6.4E',
'3.6.5E',
'3.6.5aE',
'3.6.5bE',
'3.6.6E',
'3.6.7E',
'3.6.7aE',
'3.6.7bE',
'3.6.8E',
'3.6.9E',
'3.6.9aE',
'3.6.10E',
'3.7.0S',
'3.7.0bS',
'3.7.0xaS',
'3.7.0xbS',
'3.7.1S',
'3.7.1aS',
'3.7.2S',
'3.7.2tS',
'3.7.3S',
'3.7.4S',
'3.7.4aS',
'3.7.5S',
'3.7.6S',
'3.7.7S',
'3.7.8S',
'3.8.0E',
'3.8.0S',
'3.8.1E',
'3.8.1S',
'3.8.2E',
'3.8.2S',
'3.8.3E',
'3.8.4E',
'3.8.5E',
'3.8.5aE',
'3.8.6E',
'3.8.7E',
'3.8.8E',
'3.8.9E',
'3.8.10E',
'3.8.10cE',
'3.8.10dE',
'3.8.10eE',
'3.9.0E',
'3.9.0S',
'3.9.0aS',
'3.9.0xaS',
'3.9.1E',
'3.9.1S',
'3.9.1aS',
'3.9.2E',
'3.9.2S',
'3.9.2bE',
'3.10.0E',
'3.10.0S',
'3.10.0cE',
'3.10.1E',
'3.10.1S',
'3.10.1aE',
'3.10.1sE',
'3.10.1xbS',
'3.10.1xcS',
'3.10.2E',
'3.10.2S',
'3.10.2aS',
'3.10.2tS',
'3.10.3E',
'3.10.3S',
'3.10.4S',
'3.10.5S',
'3.10.6S',
'3.10.7S',
'3.10.8S',
'3.10.8aS',
'3.10.9S',
'3.10.10S',
'3.11.0E',
'3.11.0S',
'3.11.1E',
'3.11.1S',
'3.11.1aE',
'3.11.2E',
'3.11.2S',
'3.11.2aE',
'3.11.3E',
'3.11.3S',
'3.11.3aE',
'3.11.4E',
'3.11.4S',
'3.11.5E',
'3.11.6E',
'3.11.7E',
'3.11.8E',
'3.12.0S',
'3.12.0aS',
'3.12.1S',
'3.12.2S',
'3.12.3S',
'3.12.4S',
'3.13.0S',
'3.13.0aS',
'3.13.1S',
'3.13.2S',
'3.13.2aS',
'3.13.3S',
'3.13.4S',
'3.13.5S',
'3.13.5aS',
'3.13.6S',
'3.13.6aS',
'3.13.6bS',
'3.13.7S',
'3.13.7aS',
'3.13.8S',
'3.13.9S',
'3.13.10S',
'3.14.0S',
'3.14.1S',
'3.14.2S',
'3.14.3S',
'3.14.4S',
'3.15.0S',
'3.15.1S',
'3.15.1cS',
'3.15.2S',
'3.15.3S',
'3.15.4S',
'3.16.0S',
'3.16.0aS',
'3.16.0bS',
'3.16.0cS',
'3.16.1S',
'3.16.1aS',
'3.16.2S',
'3.16.2aS',
'3.16.2bS',
'3.16.3S',
'3.16.3aS',
'3.16.4S',
'3.16.4aS',
'3.16.4bS',
'3.16.4cS',
'3.16.4dS',
'3.16.4eS',
'3.16.4gS',
'3.16.5S',
'3.16.5aS',
'3.16.5bS',
'3.16.6S',
'3.16.6bS',
'3.16.7S',
'3.16.7aS',
'3.16.7bS',
'3.16.8S',
'3.16.9S',
'3.16.10S',
'3.16.10aS',
'3.16.10bS',
'3.16.10cS',
'3.17.0S',
'3.17.1S',
'3.17.1aS',
'3.17.2S',
'3.17.3S',
'3.17.4S',
'3.18.0S',
'3.18.0SP',
'3.18.0aS',
'3.18.1S',
'3.18.1SP',
'3.18.1aSP',
'3.18.1bSP',
'3.18.1cSP',
'3.18.1gSP',
'3.18.1hSP',
'3.18.1iSP',
'3.18.2S',
'3.18.2SP',
'3.18.2aSP',
'3.18.3S',
'3.18.3SP',
'3.18.3aSP',
'3.18.3bSP',
'3.18.4S',
'3.18.4SP',
'3.18.5SP',
'3.18.6SP',
'3.18.7SP',
'3.18.8aSP',
'3.18.9SP',
'16.1.1',
'16.1.2',
'16.1.3',
'16.2.1',
'16.2.2',
'16.3.1',
'16.3.1a',
'16.3.2',
'16.3.3',
'16.3.4',
'16.3.5',
'16.3.5b',
'16.3.6',
'16.3.7',
'16.3.8',
'16.3.9',
'16.3.10',
'16.3.11',
'16.4.1',
'16.4.2',
'16.4.3',
'16.5.1',
'16.5.1a',
'16.5.1b',
'16.5.2',
'16.5.3',
'16.6.1',
'16.6.2',
'16.6.3',
'16.6.4',
'16.6.4a',
'16.6.4s',
'16.6.5',
'16.6.5a',
'16.6.5b',
'16.6.6',
'16.6.7',
'16.6.7a',
'16.6.8',
'16.6.9',
'16.6.10',
'16.7.1',
'16.7.1a',
'16.7.1b',
'16.7.2',
'16.7.3',
'16.7.4',
'16.8.1',
'16.8.1a',
'16.8.1b',
'16.8.1c',
'16.8.1d',
'16.8.1e',
'16.8.1s',
'16.8.2',
'16.8.3',
'16.9.1',
'16.9.1a',
'16.9.1b',
'16.9.1c',
'16.9.1d',
'16.9.1s',
'16.9.2',
'16.9.2a',
'16.9.2s',
'16.9.3',
'16.9.3a',
'16.9.3h',
'16.9.3s',
'16.9.4',
'16.9.4c',
'16.9.5',
'16.9.5f',
'16.9.6',
'16.9.7',
'16.9.8',
'16.9.8a',
'16.9.8b',
'16.9.8c',
'16.10.1',
'16.10.1a',
'16.10.1b',
'16.10.1c',
'16.10.1d',
'16.10.1e',
'16.10.1f',
'16.10.1g',
'16.10.1s',
'16.10.2',
'16.10.3',
'16.11.1',
'16.11.1a',
'16.11.1b',
'16.11.1c',
'16.11.1s',
'16.11.2',
'16.12.1',
'16.12.1a',
'16.12.1c',
'16.12.1s',
'16.12.1t',
'16.12.1w',
'16.12.1x',
'16.12.1y',
'16.12.1z',
'16.12.1z1',
'16.12.1z2',
'16.12.2',
'16.12.2a',
'16.12.2s',
'16.12.2t',
'16.12.3',
'16.12.3a',
'16.12.3s',
'16.12.4',
'16.12.4a',
'16.12.5',
'16.12.5a',
'16.12.5b',
'16.12.6',
'16.12.6a',
'16.12.7',
'16.12.8',
'16.12.9',
'17.1.1',
'17.1.1a',
'17.1.1s',
'17.1.1t',
'17.1.2',
'17.1.3',
'17.2.1',
'17.2.1a',
'17.2.1r',
'17.2.1v',
'17.2.2',
'17.2.3',
'17.3.1',
'17.3.1a',
'17.3.1w',
'17.3.1x',
'17.3.1z',
'17.3.2',
'17.3.2a',
'17.3.3',
'17.3.3a',
'17.3.4',
'17.3.4a',
'17.3.4b',
'17.3.4c',
'17.3.5',
'17.3.5a',
'17.3.5b',
'17.3.6',
'17.3.7',
'17.4.1',
'17.4.1a',
'17.4.1b',
'17.4.1c',
'17.4.2',
'17.4.2a',
'17.5.1',
'17.5.1a',
'17.5.1c',
'17.6.1',
'17.6.1a',
'17.6.1w',
'17.6.1x',
'17.6.1y',
'17.6.1z',
'17.6.1z1',
'17.6.2',
'17.6.3',
'17.6.3a',
'17.6.4',
'17.6.5',
'17.7.1',
'17.7.1a',
'17.7.1b',
'17.7.2',
'17.8.1',
'17.8.1a',
'17.9.1',
'17.9.1a',
'17.9.1w',
'17.9.1x',
'17.9.1x1',
'17.9.1y',
'17.9.1y1',
'17.9.2',
'17.9.2a',
'17.9.2b',
'17.9.3',
'17.9.3a',
'17.10.1',
'17.10.1a',
'17.10.1b',
'17.11.1',
'17.11.1a',
'17.11.99SW'
);
var workarounds = make_list(CISCO_WORKAROUNDS['generic_workaround']);
var workaround_params = [WORKAROUND_CONFIG['gdoi_and_g-ikev2']];
var reporting = make_array(
'port' , product_info['port'],
'severity', SECURITY_WARNING,
'version' , product_info['version'],
'cmds' , make_list('show running-config'),
'bug_id' , 'CSCwe14195, CSCwe24118, CSCwf49531'
);
cisco::check_and_report(
product_info:product_info,
workarounds : workarounds,
workaround_params : workaround_params,
reporting:reporting,
vuln_versions:version_list
);