CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:N/I:N/A:C
AI Score
Confidence
Low
EPSS
Percentile
44.8%
The remote Cisco device potentially contains an issue in the SNMP module which may allow remote authenticated users to cause a denial of service (device reload) via continuous SNMP polling requests.
#TRUSTED 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
#TRUST-RSA-SHA256 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(76969);
script_version("1.8");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/03");
script_cve_id("CVE-2014-3269");
script_bugtraq_id(67459);
script_xref(name:"CISCO-BUG-ID", value:"CSCug65204");
script_name(english:"Cisco IOS XE SNMP DoS (CSCug65204)");
script_summary(english:"Checks IOS XE version.");
script_set_attribute(attribute:"synopsis", value:"The remote device is affected by a denial of service vulnerability.");
script_set_attribute(attribute:"description", value:
"The remote Cisco device potentially contains an issue in the SNMP
module which may allow remote authenticated users to cause a denial of
service (device reload) via continuous SNMP polling requests.");
# https://tools.cisco.com/security/center/viewAlert.x?alertId=34268
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?252ae070");
script_set_attribute(attribute:"see_also", value:"https://tools.cisco.com/security/center/viewAlert.x?alertId=34268");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCug65204.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2014/05/16");
script_set_attribute(attribute:"patch_publication_date", value:"2014/05/20");
script_set_attribute(attribute:"plugin_publication_date", value:"2014/08/01");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios_xe");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2014-2024 Tenable Network Security, Inc.");
script_dependencies("cisco_ios_xe_version.nasl");
script_require_keys("Host/Cisco/IOS-XE/Version");
exit(0);
}
include("audit.inc");
include("cisco_func.inc");
include("cisco_kb_cmd_func.inc");
flag = 0;
override = 0;
# According to security note and CVE, 3.5E base is affected.
# According to CSCug65204, 3.3.*SG, 3.4.0SG, and 3.4.1SG are also affected
version = get_kb_item_or_exit("Host/Cisco/IOS-XE/Version");
if (version == '3.5.0E' || version =~ "^3\.4\.[01]SG$" || version =~ "^3\.3\.[0-9]SG$")
flag++;
if (flag)
{
flag = 0;
# Check for SUP7E or SUP7L-E modules
if (get_kb_item("Host/local_checks_enabled"))
{
buf = cisco_command_kb_item("Host/Cisco/Config/show_module", "show module");
if (check_cisco_result(buf))
{
if (preg(pattern:"WS-X45-SUP7L?-E ", multiline:TRUE, string:buf)) flag++;
}
else if (cisco_needs_enable(buf))
{
flag++;
override++;
}
}
# Check for 4500-X model
model = get_kb_item_or_exit("Host/Cisco/IOS-XE/Model");
if (model =~ "Catalyst 45[0-9][0-9]-X($|[^0-9])") flag++;
}
if (flag)
{
if (report_verbosity > 0)
{
report =
'\n Cisco Bug ID : CSCug65204' +
'\n Installed release : ' + version +
'\n';
security_warning(port:0, extra:report + cisco_caveat(override));
}
else security_warning(port:0, extra:cisco_caveat(override));
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");