Lucene search

K
openvasCopyright (C) 2017 Greenbone AGOPENVAS:1361412562310140162
HistoryFeb 16, 2017 - 12:00 a.m.

Cisco Smart Install (SMI) Protocol Misuse (cisco-sa-20170214-smi) - Unreliable Check

2017-02-1600:00:00
Copyright (C) 2017 Greenbone AG
plugins.openvas.org
80

7.8 High

AI Score

Confidence

Low

Several researchers have reported on the use of Smart Install
(SMI) protocol messages toward Smart Install clients, also known as integrated branch clients
(IBC), allowing an unauthenticated, remote attacker to change the startup-config file and force a
reload of the device, load a new IOS image on the device, and execute high-privilege CLI commands
on switches running Cisco IOS and IOS XE Software.

Cisco does not consider this a vulnerability in Cisco IOS, IOS XE, or the Smart Install feature
itself but a misuse of the Smart Install protocol, which does not require authentication by
design. Customers who are seeking more than zero-touch deployment should consider deploying the
Cisco Network Plug and Play solution instead.

# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.140162");
  script_version("2024-06-07T05:05:42+0000");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-06-07 05:05:42 +0000 (Fri, 07 Jun 2024)");
  script_tag(name:"creation_date", value:"2017-02-16 11:39:34 +0100 (Thu, 16 Feb 2017)");
  script_name("Cisco Smart Install (SMI) Protocol Misuse (cisco-sa-20170214-smi) - Unreliable Check");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2017 Greenbone AG");
  script_family("CISCO");
  script_dependencies("gb_cisco_smi_detect.nasl");
  script_mandatory_keys("cisco/smi/detected");

  script_xref(name:"URL", value:"https://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20170214-smi");
  script_xref(name:"URL", value:"http://www.securityfocus.com/archive/1/540130");
  script_xref(name:"URL", value:"https://2016.zeronights.ru/wp-content/uploads/2016/12/CiscoSmartInstall.v3.pdf");
  script_xref(name:"URL", value:"http://www.cisco.com/c/en/us/td/docs/switches/lan/smart_install/configuration/guide/smart_install/concepts.html#23355");

  script_tag(name:"summary", value:"Several researchers have reported on the use of Smart Install
  (SMI) protocol messages toward Smart Install clients, also known as integrated branch clients
  (IBC), allowing an unauthenticated, remote attacker to change the startup-config file and force a
  reload of the device, load a new IOS image on the device, and execute high-privilege CLI commands
  on switches running Cisco IOS and IOS XE Software.

  Cisco does not consider this a vulnerability in Cisco IOS, IOS XE, or the Smart Install feature
  itself but a misuse of the Smart Install protocol, which does not require authentication by
  design. Customers who are seeking more than zero-touch deployment should consider deploying the
  Cisco Network Plug and Play solution instead.");

  script_tag(name:"vuldetect", value:"Checks if SMI is enabled on the remote host which indicates
  that the system might be affected.");

  script_tag(name:"solution", value:"Cisco has updated the Smart Install Configuration Guide to
  include security best practices regarding the deployment of the Cisco Smart Install feature
  within customer infrastructures.");

  # It seems we are not able to distinguish between Director and Client. As director is not
  # affected and mitigations might be in place use a lower QoD.
  script_tag(name:"qod_type", value:"remote_banner_unreliable");
  script_tag(name:"solution_type", value:"Workaround");

  exit(0);
}

include("port_service_func.inc");

if (!port = service_get_port(proto: "cisco_smi", nodefault: TRUE))
  exit(0);

report = "A service supporting the Cisco Smart Install (SMI) protocol was detected on the target host which might be affected.";
security_message(port: port, data: report);

exit(0);

7.8 High

AI Score

Confidence

Low