Lucene search

K
ciscoCiscoCISCO-SA-20150923-SSHPK
HistorySep 23, 2015 - 4:00 p.m.

Cisco IOS and IOS XE Software SSH Version 2 RSA-Based User Authentication Bypass Vulnerability

2015-09-2316:00:00
tools.cisco.com
21

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

75.1%

A vulnerability in the SSH version 2 (SSHv2) protocol implementation of Cisco IOS and IOS XE Software could allow an
unauthenticated, remote attacker to bypass user authentication.

Successful exploitation could allow the attacker to log in with the privileges of the user or the privileges configured for the Virtual Teletype (VTY) line. Depending on the configuration of the user and of the vty line, the attacker may obtain administrative privileges on the system. The attacker cannot use this vulnerability to elevate privileges.

The attacker must know a valid username configured for Rivest, Shamir, and Adleman (RSA)-based user authentication and the public key configured for that user to exploit this vulnerability. This vulnerability
affects only devices configured for public key authentication method, also known as an RSA-based user authentication feature.

Cisco has released software updates that address this vulnerability. Workarounds for this vulnerability are not available; however administrators could temporarily disable RSA-based user authentication to avoid exploitation. This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150923-sshpk”]

Note: The September 23, 2015, release of the Cisco IOS and IOS XE Software Security Advisory bundled publication includes three Cisco Security Advisories. All the advisories address vulnerabilities in Cisco IOS Software and Cisco IOS XE Software. Individual publication links are in Cisco Event Response: September 2015 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep15.html[“http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep15.html”]

Affected configurations

Vulners
Node
ciscoiosMatch15.3s
OR
ciscoiosMatch15.4t
OR
ciscoiosMatch15.2e
OR
ciscoiosMatch15.4s
OR
ciscoiosMatch15.3m
OR
ciscoiosMatch15.2sy
OR
ciscoiosMatch15.4m
OR
ciscoiosMatch15.3xb
OR
ciscoiosMatch15.4cg
OR
ciscoiosMatch15.5s
OR
ciscoiosMatch15.5t
OR
ciscoiosMatch15.2ea
OR
ciscoiosMatch15.4sn
OR
ciscoiosMatch15.5sn
OR
ciscocisco_iosMatch3.10sxe
OR
ciscocisco_iosMatch3.11sxe
OR
ciscocisco_iosMatch3.12sxe
OR
ciscocisco_iosMatch3.13sxe
OR
ciscocisco_iosMatch3.6exe
OR
ciscocisco_iosMatch3.14sxe
OR
ciscocisco_iosMatch3.7exe
OR
ciscoiosMatch15.3\(3\)s
OR
ciscoiosMatch15.3\(3\)s1
OR
ciscoiosMatch15.3\(3\)s2
OR
ciscoiosMatch15.3\(3\)s3
OR
ciscoiosMatch15.3\(3\)s4
OR
ciscoiosMatch15.3\(3\)s1a
OR
ciscoiosMatch15.3\(3\)s5
OR
ciscoiosMatch15.3\(3\)s2a
OR
ciscoiosMatch15.4\(1\)t
OR
ciscoiosMatch15.4\(2\)t
OR
ciscoiosMatch15.4\(1\)t2
OR
ciscoiosMatch15.4\(1\)t1
OR
ciscoiosMatch15.4\(1\)t3
OR
ciscoiosMatch15.4\(2\)t1
OR
ciscoiosMatch15.4\(2\)t2
OR
ciscoiosMatch15.2\(2\)e
OR
ciscoiosMatch15.2\(3\)e
OR
ciscoiosMatch15.2\(2\)e1
OR
ciscoiosMatch15.2\(2b\)e
OR
ciscoiosMatch15.2\(2\)e2
OR
ciscoiosMatch15.2\(2a\)e1
OR
ciscoiosMatch15.2\(2a\)e2
OR
ciscoiosMatch15.2\(3a\)e
OR
ciscoiosMatch15.4\(1\)s
OR
ciscoiosMatch15.4\(3\)s
OR
ciscoiosMatch15.4\(1\)s1
OR
ciscoiosMatch15.4\(1\)s2
OR
ciscoiosMatch15.4\(2\)s1
OR
ciscoiosMatch15.4\(1\)s3
OR
ciscoiosMatch15.4\(3\)s1
OR
ciscoiosMatch15.4\(2\)s2
OR
ciscoiosMatch15.4\(3\)s2
OR
ciscoiosMatch15.4\(3\)s0d
OR
ciscoiosMatch15.4\(3\)s0e
OR
ciscoiosMatch15.4\(3\)s0f
OR
ciscoiosMatch15.3\(3\)m1
OR
ciscoiosMatch15.3\(3\)m2
OR
ciscoiosMatch15.3\(3\)m3
OR
ciscoiosMatch15.3\(3\)m5
OR
ciscoiosMatch15.3\(3\)m4
OR
ciscoiosMatch15.2\(1\)sy
OR
ciscoiosMatch15.2\(1\)sy0a
OR
ciscoiosMatch15.4\(3\)m
OR
ciscoiosMatch15.4\(3\)m1
OR
ciscoiosMatch15.4\(3\)m2
OR
ciscoiosMatch15.3\(3\)xb12
OR
ciscoiosMatch15.4\(1\)cg
OR
ciscoiosMatch15.4\(1\)cg1
OR
ciscoiosMatch15.4\(2\)cg
OR
ciscoiosMatch15.5\(1\)s
OR
ciscoiosMatch15.5\(1\)t
OR
ciscoiosMatch15.2\(2\)ea
OR
ciscoiosMatch15.2\(2\)ea1
OR
ciscoiosMatch15.2\(3\)ea
OR
ciscoiosMatch15.4\(2\)sn
OR
ciscoiosMatch15.4\(2\)sn1
OR
ciscoiosMatch15.4\(3\)sn1
OR
ciscoiosMatch15.4\(3\)sn1a
OR
ciscoiosMatch15.5\(1\)sn
OR
ciscocisco_iosMatch3.10.0sxe
OR
ciscocisco_iosMatch3.10.1sxe
OR
ciscocisco_iosMatch3.10.2sxe
OR
ciscocisco_iosMatch3.10.3sxe
OR
ciscocisco_iosMatch3.10.4sxe
OR
ciscocisco_iosMatch3.10.5sxe
OR
ciscocisco_iosMatch3.10.1xcsxe
OR
ciscocisco_iosMatch3.10.2asxe
OR
ciscocisco_iosMatch3.10.2tsxe
OR
ciscocisco_iosMatch3.10.1xbsxe
OR
ciscocisco_iosMatch3.11.1sxe
OR
ciscocisco_iosMatch3.11.2sxe
OR
ciscocisco_iosMatch3.11.0sxe
OR
ciscocisco_iosMatch3.11.3sxe
OR
ciscocisco_iosMatch3.12.0sxe
OR
ciscocisco_iosMatch3.12.1sxe
OR
ciscocisco_iosMatch3.12.2sxe
OR
ciscocisco_iosMatch3.12.0asxe
OR
ciscocisco_iosMatch3.13.0sxe
OR
ciscocisco_iosMatch3.13.1sxe
OR
ciscocisco_iosMatch3.13.2sxe
OR
ciscocisco_iosMatch3.13.2asxe
OR
ciscocisco_iosMatch3.13.0asxe
OR
ciscocisco_iosMatch3.6.0exe
OR
ciscocisco_iosMatch3.6.1exe
OR
ciscocisco_iosMatch3.6.0aexe
OR
ciscocisco_iosMatch3.6.0bexe
OR
ciscocisco_iosMatch3.6.2aexe
OR
ciscocisco_iosMatch3.6.2exe
OR
ciscocisco_iosMatch3.14.0sxe
OR
ciscocisco_iosMatch3.7.0exe
Rows per page:
1-10 of 1111

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

75.1%

Related for CISCO-SA-20150923-SSHPK