Lucene search

K
nessusThis script is Copyright (C) 2014-2024 Tenable Network Security, Inc.CISCO-SN-CVE-2014-3296-IOSXE.NASL
HistoryAug 01, 2014 - 12:00 a.m.

Cisco IOS XE SNMP DoS (CSCug65204)

2014-08-0100:00:00
This script is Copyright (C) 2014-2024 Tenable Network Security, Inc.
www.tenable.com
16

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

AI Score

6.3

Confidence

Low

EPSS

0.001

Percentile

44.8%

The remote Cisco device potentially contains an issue in the SNMP module which may allow remote authenticated users to cause a denial of service (device reload) via continuous SNMP polling requests.

#TRUSTED 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
#TRUST-RSA-SHA256 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
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(76969);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/03");

  script_cve_id("CVE-2014-3269");
  script_bugtraq_id(67459);
  script_xref(name:"CISCO-BUG-ID", value:"CSCug65204");

  script_name(english:"Cisco IOS XE SNMP DoS (CSCug65204)");
  script_summary(english:"Checks IOS XE version.");

  script_set_attribute(attribute:"synopsis", value:"The remote device is affected by a denial of service vulnerability.");
  script_set_attribute(attribute:"description", value:
"The remote Cisco device potentially contains an issue in the SNMP
module which may allow remote authenticated users to cause a denial of
service (device reload) via continuous SNMP polling requests.");
  # https://tools.cisco.com/security/center/viewAlert.x?alertId=34268
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?252ae070");
  script_set_attribute(attribute:"see_also", value:"https://tools.cisco.com/security/center/viewAlert.x?alertId=34268");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCug65204.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2014/05/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2014/05/20");
  script_set_attribute(attribute:"plugin_publication_date", value:"2014/08/01");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios_xe");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2014-2024 Tenable Network Security, Inc.");

  script_dependencies("cisco_ios_xe_version.nasl");
  script_require_keys("Host/Cisco/IOS-XE/Version");

  exit(0);
}

include("audit.inc");
include("cisco_func.inc");
include("cisco_kb_cmd_func.inc");

flag = 0;
override = 0;

# According to security note and CVE, 3.5E base is affected.
# According to CSCug65204, 3.3.*SG, 3.4.0SG, and 3.4.1SG are also affected
version = get_kb_item_or_exit("Host/Cisco/IOS-XE/Version");
if (version == '3.5.0E' || version =~ "^3\.4\.[01]SG$" || version =~ "^3\.3\.[0-9]SG$")
  flag++;


if (flag)
{
  flag = 0;

  # Check for SUP7E or SUP7L-E modules
  if (get_kb_item("Host/local_checks_enabled"))
  {
    buf = cisco_command_kb_item("Host/Cisco/Config/show_module", "show module");
    if (check_cisco_result(buf))
    {
      if (preg(pattern:"WS-X45-SUP7L?-E ", multiline:TRUE, string:buf)) flag++;
    }
    else if (cisco_needs_enable(buf))
    {
      flag++;
      override++;
    }
  }

  # Check for 4500-X model
  model = get_kb_item_or_exit("Host/Cisco/IOS-XE/Model");
  if (model =~ "Catalyst 45[0-9][0-9]-X($|[^0-9])") flag++;
}


if (flag)
{
  if (report_verbosity > 0)
  {
    report =
    '\n  Cisco Bug ID      : CSCug65204' +
    '\n  Installed release : ' + version +
    '\n';
    security_warning(port:0, extra:report + cisco_caveat(override));
  }
  else security_warning(port:0, extra:cisco_caveat(override));
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

AI Score

6.3

Confidence

Low

EPSS

0.001

Percentile

44.8%

Related for CISCO-SN-CVE-2014-3296-IOSXE.NASL