Lucene search

K
nessusThis script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO-SA-SD-WAN-FILE-ACCESS-VW36D28P.NASL
HistoryApr 13, 2022 - 12:00 a.m.

Cisco SD-WAN Solution Improper Access Control (cisco-sa-sd-wan-file-access-VW36d28P)

2022-04-1300:00:00
This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
10

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

According to its self-reported version, Cisco SD-WAN Viptela Software is affected by a vulnerability.

  • A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper access control on files within the affected system. A local attacker could exploit this vulnerability by modifying certain files on the vulnerable device. If successful, the attacker could gain escalated privileges and take actions on the system with the privileges of the root user. (CVE-2022-20716)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

#TRUSTED 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
#TRUST-RSA-SHA256 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
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable, Inc.
##

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(159718);
  script_version("1.10");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/05");

  script_cve_id("CVE-2022-20716");
  script_xref(name:"CISCO-BUG-ID", value:"CSCvy11382");
  script_xref(name:"CISCO-SA", value:"cisco-sa-sd-wan-file-access-VW36d28P");
  script_xref(name:"IAVA", value:"2022-A-0158-S");

  script_name(english:"Cisco SD-WAN Solution Improper Access Control (cisco-sa-sd-wan-file-access-VW36d28P)");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco SD-WAN Viptela Software is affected by a vulnerability.

  - A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain
    escalated privileges. This vulnerability is due to improper access control on files within the affected
    system. A local attacker could exploit this vulnerability by modifying certain files on the vulnerable
    device. If successful, the attacker could gain escalated privileges and take actions on the system with
    the privileges of the root user. (CVE-2022-20716)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-file-access-VW36d28P
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f70bc151");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy11382");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvy11382");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-20716");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(284);

  script_set_attribute(attribute:"vuln_publication_date", value:"2022/04/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2022/04/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2022/04/13");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:sd-wan_vmanage");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:sd-wan_firmware");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/a:cisco:sd-wan_vbond_orchestrator");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/a:cisco:sd-wan_vedge");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/a:cisco:sd-wan_vsmart_controller");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/a:cisco:vedge_cloud_router");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_vedge_detect.nbin");
  script_require_keys("Cisco/Viptela/Version", "Cisco/Viptela/Model");

  exit(0);
}

include('ccf.inc');

var product_info = cisco::get_product_info(name:'Cisco Viptela');

if (tolower(product_info['model']) !~ "vbond|vedge|vedge cloud|vmanage|vsmart")
  audit(AUDIT_HOST_NOT, 'an affected model');

var vuln_ranges = [
  { 'min_ver' : '18.4', 'fix_ver' : '20.3.6' },
  { 'min_ver' : '20.4', 'fix_ver' : '20.6.1' },
  { 'min_ver' : '20.7', 'fix_ver' : '20.7.1' }
];

 
var reporting = make_array(
  'port'     , 0,
  'severity' , SECURITY_HOLE,
  'bug_id'   , 'CSCvy11382',
  'version'  , product_info['version'],
  'disable_caveat', TRUE
);

cisco::check_and_report(
  product_info:product_info,
  vuln_ranges:vuln_ranges,
  reporting:reporting
);
VendorProductVersionCPE
ciscosd-wan_firmwarecpe:/o:cisco:sd-wan_firmware
ciscosd-wan_vbond_orchestratorx-cpe:/a:cisco:sd-wan_vbond_orchestrator
ciscovedge_cloud_routerx-cpe:/a:cisco:vedge_cloud_router
ciscosd-wan_vmanagecpe:/a:cisco:sd-wan_vmanage
ciscosd-wan_vsmart_controllerx-cpe:/a:cisco:sd-wan_vsmart_controller
ciscosd-wan_vedgex-cpe:/a:cisco:sd-wan_vedge

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Related for CISCO-SA-SD-WAN-FILE-ACCESS-VW36D28P.NASL