Cisco IOS L2TP Parsing DoS vulnerability in Layer 2 Tunneling Protocol (L2TP) functio
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | Cisco IOS and IOS XE Software Layer 2 Tunneling Protocol Denial of Service Vulnerability | 22 Mar 201716:00 | – | cisco |
![]() | CVE-2017-3857 | 22 Mar 201719:00 | – | cvelist |
![]() | Cisco IOS XE L2TP Parsing DoS (cisco-sa-20170322-l2tp) | 28 Mar 201700:00 | – | nessus |
![]() | Input validation | 22 Mar 201719:59 | – | prion |
![]() | Cisco IOS XE Software Layer 2 Tunneling Protocol Denial of Service Vulnerability | 23 Mar 201700:00 | – | openvas |
![]() | Cisco IOS Software Layer 2 Tunneling Protocol Denial of Service Vulnerability | 23 Mar 201700:00 | – | openvas |
![]() | CVE-2017-3857 | 22 Mar 201719:59 | – | cve |
![]() | CVE-2017-3857 | 22 Mar 201719:59 | – | nvd |
![]() | Cisco Patches Critical IOx Vulnerability | 23 Mar 201715:24 | – | threatpost |
#TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(99028);
script_version("1.9");
script_cvs_date("Date: 2019/11/13");
script_cve_id("CVE-2017-3857");
script_bugtraq_id(97010);
script_xref(name:"CISCO-BUG-ID", value:"CSCuy82078");
script_xref(name:"CISCO-SA", value:"cisco-sa-20170322-l2tp");
script_name(english:"Cisco IOS L2TP Parsing DoS (cisco-sa-20170322-l2tp)");
script_summary(english:"Checks the IOS version.");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, the Cisco IOS software running
on the remote device is affected by a denial of service vulnerability
in its Layer 2 Tunneling Protocol (L2TP) parsing function due to
insufficient validation of L2TP packets. An unauthenticated, remote
attacker can exploit this issue, via a specially crafted L2TP packet,
to cause the device to reload.
Note that this issue only affects devices if the L2TP feature is
enabled and the device is configured as an L2TP Version 2 (L2TPv2) or
L2TP Version 3 (L2TPv3) endpoint. By default, the L2TP feature is not
enabled.");
# https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-l2tp
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d4fc7ea8");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuy82078");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCuy82078.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-3857");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/03/22");
script_set_attribute(attribute:"patch_publication_date", value:"2017/03/22");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/03/28");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ios_version.nasl");
script_require_keys("Host/Cisco/IOS/Version");
exit(0);
}
include("audit.inc");
include("cisco_workarounds.inc");
include("ccf.inc");
product_info = cisco::get_product_info(name:"Cisco IOS");
version_list = make_list(
"12.0(33)S",
"12.0(33)S5",
"12.0(33)S7",
"12.0(33)S6",
"12.0(33)S9",
"12.0(33)S8",
"12.0(33)S1",
"12.0(33)S2",
"12.0(33)S3",
"12.0(33)S10",
"12.0(33)S4",
"12.0(33)S11",
"12.0(33)S12",
"12.0(33)S13",
"12.0(33)S14",
"12.2(33)CX",
"12.2(33)CY",
"12.2(33)CY1",
"12.2(37)SE",
"12.2(55)SE",
"12.2(46)SE",
"12.2(50)SE1",
"12.2(44)SE2",
"12.2(50)SE5",
"12.2(44)SE1",
"12.2(37)SE1",
"12.2(55)SE3",
"12.2(40)SE",
"12.2(44)SE",
"12.2(52)SE",
"12.2(50)SE3",
"12.2(44)SE6",
"12.2(44)SE3",
"12.2(54)SE",
"12.2(44)SE5",
"12.2(50)SE4",
"12.2(50)SE",
"12.2(55)SE4",
"12.2(58)SE2",
"12.2(55)SE5",
"12.2(55)SE6",
"12.2(55)SE7",
"12.2(55)SE8",
"12.2(55)SE9",
"12.2(55)SE10",
"12.2(55)SE11",
"12.2(33)ZI",
"12.2(58)EX",
"12.2(58)EZ",
"12.2(60)EZ4",
"12.2(60)EZ5",
"12.4(11)MR",
"12.4(12)MR",
"12.4(16)MR",
"12.4(16)MR1",
"12.4(19)MR2",
"12.4(19)MR1",
"12.4(19)MR",
"12.4(20)MR",
"12.4(19)MR3",
"12.4(12)MR1",
"12.4(20)MR2",
"12.4(16)MR2",
"12.4(12)MR2",
"12.4(20)MR1",
"12.4(11)T",
"12.4(15)T",
"12.4(20)T",
"12.4(24)T",
"12.4(24)T3",
"12.4(20)T1",
"12.4(22)T1",
"12.4(15)T9",
"12.4(11)T4",
"12.4(15)T8",
"12.4(15)T15",
"12.4(24)T5",
"12.4(15)T2",
"12.4(15)T12",
"12.4(24)T4",
"12.4(20)T3",
"12.4(22)T",
"12.4(15)T6a",
"12.4(20)T6",
"12.4(24)T8",
"12.4(15)T13",
"12.4(15)T3",
"12.4(24)T2",
"12.4(22)T5",
"12.4(15)T10",
"12.4(22)T4",
"12.4(20)T5",
"12.4(15)T4",
"12.4(24)T1",
"12.4(24)T7",
"12.4(22)T3",
"12.4(20)T9",
"12.4(24)T6",
"12.4(15)T13b",
"12.4(20)T5a",
"12.4(15)T5",
"12.4(20)T2",
"12.4(11)T1",
"12.4(15)T11",
"12.4(15)T7",
"12.4(11)T2",
"12.4(15)T14",
"12.4(11)T3",
"12.4(15)T6",
"12.4(15)T16",
"12.4(15)T1",
"12.4(22)T2",
"12.4(20)T4",
"12.4(24)T4a",
"12.4(24)T4b",
"12.4(24)T3e",
"12.4(24)T4c",
"12.4(15)T17",
"12.4(24)T4d",
"12.4(24)T9",
"12.4(24)T4e",
"12.4(24)T3f",
"12.4(24)T4f",
"12.4(24)T4g",
"12.4(24)T4h",
"12.4(24)T10",
"12.4(24)T4i",
"12.4(24)T4j",
"12.4(24)T4k",
"12.4(24)T4l",
"12.4(24)T11",
"12.4(24)T4m",
"12.4(24)T4n",
"12.4(24)T12",
"12.4(24)T4o",
"12.2(37)SG1",
"12.2(33)SB3",
"12.2(34)SB2",
"12.2(33)SB8b",
"12.2(33)SB9",
"12.2(33)SB8e",
"12.2(33)SB10",
"12.2(33)SB6",
"12.2(34)SB4d",
"12.2(33)SB5",
"12.2(34)SB4b",
"12.2(33)SB8",
"12.2(34)SB3",
"12.2(34)SB4",
"12.2(33)SB6a",
"12.2(34)SB4a",
"12.2(33)SB8c",
"12.2(33)SB1a",
"12.2(33)SB2",
"12.2(33)SB8d",
"12.2(34)SB4c",
"12.2(33)SB6b",
"12.2(34)SB1",
"12.2(33)SB",
"12.2(33)SB1b",
"12.2(33)SB7",
"12.2(33)SB1",
"12.2(33)SB4",
"12.2(33)SB8f",
"12.2(33)SB11",
"12.2(33)SB12",
"12.2(33)SB8g",
"12.2(33)SB13",
"12.2(33)SB14",
"12.2(33)SB15",
"12.2(33)SB16",
"12.2(33)SB17",
"12.2(33)SB8a",
"12.4(11)SW",
"12.4(15)SW6",
"12.4(15)SW",
"12.4(11)SW1",
"12.4(15)SW5",
"12.4(15)SW1",
"12.4(15)SW4",
"12.4(11)SW3",
"12.4(11)SW2",
"12.4(15)SW3",
"12.4(15)SW2",
"12.4(15)SW7",
"12.4(15)SW8",
"12.4(15)SW8a",
"12.4(15)SW9",
"12.4(11)XJ",
"12.4(11)XJ1",
"12.4(11)XJ3",
"12.4(11)XJ6",
"12.4(11)XJ2",
"12.4(11)XJ5",
"12.4(11)XJ4",
"12.4(14)XK",
"12.4(11)XV",
"12.4(11)XV1",
"12.4(11)XW",
"12.4(11)XW3",
"12.4(11)XW7",
"12.4(11)XW10",
"12.4(11)XW8",
"12.4(11)XW9",
"12.4(11)XW6",
"12.4(11)XW4",
"12.4(11)XW1",
"12.4(11)XW5",
"12.4(11)XW2",
"12.4(15)XF",
"12.2(33)SCA2",
"12.2(33)SCA1",
"12.2(33)SCA",
"12.2(33)SRC2",
"12.2(33)SRC",
"12.2(33)SRC3",
"12.2(33)SRC5",
"12.2(33)SRC6",
"12.2(33)SRC4",
"12.2(33)SRC1",
"12.4(15)XQ4",
"12.4(15)XQ1",
"12.4(15)XQ7",
"12.4(15)XQ2a",
"12.4(15)XQ6",
"12.4(15)XQ2",
"12.4(15)XQ",
"12.4(15)XQ3",
"12.4(15)XQ2c",
"12.4(15)XQ5",
"12.4(15)XQ2b",
"12.4(15)XQ8",
"12.4(15)XQ2d",
"12.4(15)XY4",
"12.4(15)XY5",
"12.4(15)XY1",
"12.4(15)XY",
"12.4(15)XY2",
"12.4(15)XY3",
"12.4(15)XZ",
"12.4(15)XZ2",
"12.4(15)XZ1",
"12.4(15)XL3",
"12.4(15)XL1",
"12.4(15)XL2",
"12.4(15)XL4",
"12.4(15)XL5",
"12.4(15)XL",
"12.4(15)XM3",
"12.4(15)XM1",
"12.4(15)XM2",
"12.4(15)XM",
"12.4(15)XN",
"12.4(22)XR5",
"12.4(22)XR4",
"12.4(15)XR5",
"12.4(15)XR2",
"12.4(22)XR7",
"12.4(15)XR4",
"12.4(15)XR1",
"12.4(15)XR7",
"12.4(22)XR2",
"12.4(15)XR9",
"12.4(15)XR6",
"12.4(15)XR3",
"12.4(15)XR",
"12.4(22)XR6",
"12.4(22)XR10",
"12.4(15)XR8",
"12.4(22)XR1",
"12.4(22)XR9",
"12.4(22)XR3",
"12.4(22)XR8",
"12.4(22)XR11",
"12.4(15)XR10",
"12.4(22)XR12",
"12.4(20)YA3",
"12.4(20)YA2",
"12.4(20)YA",
"12.4(20)YA1",
"12.2(33)IRA",
"12.2(33)IRB",
"12.2(33)SCB9",
"12.2(33)SCB",
"12.2(33)SCB6",
"12.2(33)SCB3",
"12.2(33)SCB10",
"12.2(33)SCB4",
"12.2(33)SCB2",
"12.2(33)SCB7",
"12.2(33)SCB1",
"12.2(33)SCB5",
"12.2(33)SCB8",
"12.2(33)SCB11",
"12.2(33)SRD7",
"12.2(33)SRD6",
"12.2(33)SRD4a",
"12.2(33)SRD2a",
"12.2(33)SRD4",
"12.2(33)SRD5",
"12.2(33)SRD3",
"12.2(33)SRD2",
"12.2(33)SRD1",
"12.2(33)SRD",
"12.2(33)SRD8",
"12.2(50)SQ2",
"12.2(50)SQ1",
"12.2(50)SQ",
"12.2(50)SQ3",
"12.2(50)SQ4",
"12.2(50)SQ5",
"12.2(50)SQ6",
"12.2(50)SQ7",
"12.4(22)YB5",
"12.4(22)YB",
"12.4(22)YB2",
"12.4(22)YB7",
"12.4(22)YB4",
"12.4(22)YB1",
"12.4(22)YB8",
"12.4(22)YB3",
"12.4(22)YB6",
"12.4(22)YD3",
"12.4(22)YD",
"12.4(22)YD1",
"12.4(22)YD2",
"12.4(22)YD4",
"12.4(22)YE2",
"12.4(22)YE",
"12.4(22)YE3",
"12.4(22)YE4",
"12.4(22)YE1",
"12.4(24)YE2",
"12.4(24)YE",
"12.4(22)YE5",
"12.4(24)YE1",
"12.4(24)YE3",
"12.4(24)YE3a",
"12.4(24)YE4",
"12.4(22)YE6",
"12.4(24)YE5",
"12.4(24)YE3b",
"12.4(24)YE6",
"12.4(24)YE7",
"12.4(24)YE3c",
"12.4(24)YE3d",
"12.4(24)YE3e",
"12.2(33)IRC",
"12.4(22)GC1",
"12.4(24)GC1",
"12.4(24)GC3",
"12.4(24)GC3a",
"12.4(24)GC4",
"12.4(22)GC1a",
"12.4(24)GC5",
"12.2(33)SCC",
"12.2(33)SCC2",
"12.2(33)SCC6",
"12.2(33)SCC7",
"12.2(33)SCC5",
"12.2(33)SCC4",
"12.2(33)SCC3",
"12.2(33)SCC1",
"12.2(33)SCD5",
"12.2(33)SCD1",
"12.2(33)SCD7",
"12.2(33)SCD4",
"12.2(33)SCD",
"12.2(33)SCD6",
"12.2(33)SCD3",
"12.2(33)SCD2",
"12.2(33)SCD8",
"12.4(24)YG3",
"12.4(24)YG4",
"12.4(24)YG1",
"12.4(24)YG2",
"15.0(1)M1",
"15.0(1)M5",
"15.0(1)M4",
"15.0(1)M3",
"15.0(1)M2",
"15.0(1)M6",
"15.0(1)M",
"15.0(1)M7",
"15.0(1)M10",
"15.0(1)M9",
"15.0(1)M8",
"15.0(1)M6a",
"15.0(1)XA2",
"15.0(1)XA4",
"15.0(1)XA1",
"15.0(1)XA3",
"15.0(1)XA",
"15.0(1)XA5",
"15.1(2)T",
"15.1(1)T4",
"15.1(3)T2",
"15.1(1)T1",
"15.1(2)T0a",
"15.1(3)T3",
"15.1(1)T3",
"15.1(2)T3",
"15.1(2)T4",
"15.1(1)T2",
"15.1(3)T",
"15.1(2)T2a",
"15.1(3)T1",
"15.1(1)T",
"15.1(2)T2",
"15.1(2)T1",
"15.1(2)T5",
"15.1(3)T4",
"15.1(1)T5",
"15.1(1)XB",
"15.1(1)XB3",
"15.1(1)XB1",
"15.1(1)XB2",
"15.1(4)XB4",
"15.1(4)XB5",
"15.1(4)XB6",
"15.1(4)XB5a",
"15.1(4)XB7",
"15.1(4)XB8",
"15.1(4)XB8a",
"12.2(33)SRE1",
"12.2(33)SRE2",
"12.2(33)SRE3",
"12.2(33)SRE4",
"12.2(33)SRE",
"12.2(33)SRE0a",
"12.2(33)SRE5",
"12.2(33)SRE6",
"12.2(33)SRE8",
"12.2(33)SRE7",
"12.2(33)SRE9",
"12.2(33)SRE7a",
"12.2(33)SRE10",
"12.2(33)SRE11",
"12.2(33)SRE9a",
"12.2(33)SRE12",
"12.2(33)SRE13",
"12.2(33)SRE14",
"12.2(33)SRE15",
"15.0(1)S2",
"15.0(1)S1",
"15.0(1)S",
"15.0(1)S3a",
"15.0(1)S4",
"15.0(1)S5",
"15.0(1)S4a",
"15.0(1)S6",
"12.2(33)IRD",
"12.2(33)IRE",
"12.2(33)IRE2",
"12.2(33)IRE1",
"12.2(33)MRA",
"12.2(33)MRB5",
"12.2(33)MRB2",
"12.2(33)MRB1",
"12.2(33)MRB4",
"12.2(33)MRB",
"12.2(33)MRB3",
"12.2(33)MRB6",
"15.2(1)S",
"15.2(2)S",
"15.2(1)S1",
"15.2(4)S",
"15.2(1)S2",
"15.2(2)S1",
"15.2(2)S2",
"15.2(2)S0a",
"15.2(2)S0c",
"15.2(2)S0d",
"15.2(4)S1",
"15.2(4)S4",
"15.2(4)S6",
"15.2(4)S2",
"15.2(4)S5",
"15.2(4)S3",
"15.2(4)S0c",
"15.2(4)S1c",
"15.2(4)S3a",
"15.2(4)S4a",
"15.2(4)S7",
"15.2(4)S8",
"15.3(1)T",
"15.3(2)T",
"15.3(1)T1",
"15.3(1)T2",
"15.3(1)T3",
"15.3(1)T4",
"15.3(2)T1",
"15.3(2)T2",
"15.3(2)T3",
"15.3(2)T4",
"12.4(20)MRB",
"12.4(20)MRB1",
"15.2(1)T",
"15.2(2)T",
"15.2(3)T",
"15.2(1)T1",
"15.2(1)T3",
"15.2(1)T2",
"15.2(1)T4",
"15.2(2)T1",
"15.2(3)T3",
"15.2(3)T4",
"15.2(3)T1",
"15.2(2)T3",
"15.2(3)T2",
"15.2(2)T2",
"15.2(2)T4",
"15.2(1)T3a",
"12.2(33)ZZ",
"15.1(2)S",
"15.1(1)S",
"15.1(1)S1",
"15.1(3)S",
"15.1(1)S2",
"15.1(2)S1",
"15.1(2)S2",
"15.1(3)S1",
"15.1(3)S0a",
"15.1(3)S2",
"15.1(3)S4",
"15.1(3)S3",
"15.1(3)S5",
"15.1(3)S6",
"15.1(3)S5a",
"15.1(3)S7",
"15.1(4)M3",
"15.1(4)M",
"15.1(4)M1",
"15.1(4)M2",
"15.1(4)M6",
"15.1(4)M5",
"15.1(4)M4",
"15.1(4)M0a",
"15.1(4)M0b",
"15.1(4)M7",
"15.1(4)M3a",
"15.1(4)M10",
"15.1(4)M8",
"15.1(4)M9",
"15.1(4)M12a",
"12.2(33)IRF",
"15.0(2)SE8",
"15.1(2)GC",
"15.1(2)GC1",
"15.1(2)GC2",
"15.1(4)GC",
"15.1(4)GC1",
"15.1(4)GC2",
"15.0(1)MR",
"15.0(2)MR",
"12.2(33)SCF",
"12.2(33)SCF1",
"12.2(33)SCF2",
"12.2(33)SCF3",
"12.2(33)SCF4",
"12.2(33)SCF5",
"15.2(4)M",
"15.2(4)M1",
"15.2(4)M2",
"15.2(4)M4",
"15.2(4)M3",
"15.2(4)M5",
"15.2(4)M8",
"15.2(4)M10",
"15.2(4)M7",
"15.2(4)M6",
"15.2(4)M9",
"15.2(4)M6b",
"15.2(4)M6a",
"15.2(4)M11",
"12.2(33)SCE",
"12.2(33)SCE1",
"12.2(33)SCE2",
"12.2(33)SCE3",
"12.2(33)SCE4",
"12.2(33)SCE5",
"12.2(33)SCE6",
"12.2(33)IRG",
"12.2(33)IRG1",
"15.1(1)MR",
"15.1(1)MR1",
"15.1(1)MR2",
"15.1(1)MR3",
"15.1(3)MR",
"15.1(1)MR4",
"15.1(1)MR5",
"15.1(1)MR6",
"15.0(1)EX",
"15.0(2)EX2",
"15.0(2)EX8",
"15.2(1)GC",
"15.2(1)GC1",
"15.2(1)GC2",
"15.2(2)GC",
"15.2(3)GC",
"15.2(3)GC1",
"15.2(4)GC",
"15.2(4)GC1",
"15.2(4)GC2",
"15.2(4)GC3",
"15.1(2)EY",
"15.1(2)EY1",
"15.1(2)EY1a",
"15.1(2)EY2",
"15.1(2)EY3",
"15.1(2)EY2a",
"15.1(2)EY4",
"12.2(33)SCG",
"12.2(33)SCG1",
"12.2(33)SCG2",
"12.2(33)SCG3",
"12.2(33)SCG4",
"12.2(33)SCG5",
"12.2(33)SCG6",
"12.2(33)SCG7",
"15.1(2)SNG",
"12.2(33)IRH",
"12.2(33)IRH1",
"15.1(2)SY",
"15.3(1)S",
"15.3(2)S",
"15.3(3)S",
"15.3(1)S2",
"15.3(1)S1",
"15.3(2)S2",
"15.3(2)S1",
"15.3(1)S1e",
"15.3(3)S1",
"15.3(3)S2",
"15.3(3)S3",
"15.3(3)S6",
"15.3(3)S4",
"15.3(3)S1a",
"15.3(3)S5",
"15.3(3)S2a",
"15.3(3)S7",
"15.3(3)S8",
"15.3(3)S6a",
"15.3(3)S8a",
"15.1(2)SNH",
"15.1(2)SNH1",
"15.1(2)SNI",
"15.1(2)SNI1",
"15.2(2)SNG",
"15.2(3)XA",
"15.4(1)T",
"15.4(2)T",
"15.4(1)T2",
"15.4(1)T1",
"15.4(1)T3",
"15.4(2)T1",
"15.4(2)T3",
"15.4(2)T2",
"15.4(1)T4",
"15.4(2)T4",
"12.2(33)SCH",
"12.2(33)SCH1",
"12.2(33)SCH2",
"12.2(33)SCH0a",
"12.2(33)SCH3",
"12.2(33)SCH2a",
"12.2(33)SCH4",
"12.2(33)SCH5",
"12.2(33)SCH6",
"15.2(4)JA",
"15.2(4)JA1",
"15.2(6)E0b",
"15.1(3)MRA",
"15.1(3)MRA1",
"15.1(3)MRA2",
"15.2(2)SNH",
"15.2(2)SNH1",
"15.2(4)XB10",
"15.2(4)XB11",
"15.2(2)JB1",
"15.2(2)JB",
"15.2(2)JB2",
"15.2(4)JB",
"15.2(2)JB3",
"15.2(4)JB1",
"15.2(4)JB2",
"15.2(4)JB3",
"15.2(4)JB3a",
"15.2(2)JB4",
"15.2(4)JB4",
"15.2(4)JB3h",
"15.2(4)JB3b",
"15.2(4)JB3s",
"15.2(4)JB5",
"15.2(4)JB5m",
"15.2(4)JB6",
"15.2(2)JB5",
"15.2(2)JB6",
"15.4(1)S",
"15.4(3)S",
"15.4(1)S1",
"15.4(1)S2",
"15.4(2)S1",
"15.4(1)S3",
"15.4(3)S1",
"15.4(2)S2",
"15.4(3)S2",
"15.4(3)S3",
"15.4(1)S4",
"15.4(2)S3",
"15.4(2)S4",
"15.4(3)S0d",
"15.4(3)S4",
"15.4(3)S0e",
"15.4(3)S5",
"15.4(3)S0f",
"15.3(3)M",
"15.3(3)M1",
"15.3(3)M2",
"15.3(3)M3",
"15.3(3)M5",
"15.3(3)M4",
"15.3(3)M6",
"15.3(3)M7",
"15.3(3)M8",
"15.3(3)M8a",
"15.2(2)SNI",
"15.2(4)JN",
"15.2(4)JN1",
"15.2(3)GCA",
"15.2(3)GCA1",
"15.2(2)SC3",
"12.4(24)YS",
"12.4(24)YS1",
"12.4(24)YS2",
"12.4(24)YS3",
"12.4(24)YS4",
"12.4(24)YS5",
"12.4(24)YS6",
"12.4(24)YS7",
"12.4(24)YS8",
"12.4(24)YS8a",
"12.4(24)YS9",
"12.4(24)YS10",
"15.4(3)M",
"15.4(3)M1",
"15.4(3)M2",
"15.4(3)M3",
"15.4(3)M4",
"15.4(3)M5",
"15.4(3)M6",
"15.4(3)M6a",
"15.2(4)JAZ",
"15.2(4)JAZ1",
"15.3(3)XB12",
"15.4(1)CG",
"15.4(1)CG1",
"15.4(2)CG",
"15.5(1)S",
"15.5(2)S",
"15.5(1)S1",
"15.5(3)S",
"15.5(1)S2",
"15.5(1)S3",
"15.5(2)S1",
"15.5(2)S2",
"15.5(3)S1",
"15.5(3)S1a",
"15.5(2)S3",
"15.5(3)S2",
"15.5(3)S0a",
"15.5(1)S4",
"15.5(2)S4",
"15.5(1)T",
"15.5(1)T1",
"15.5(2)T",
"15.5(1)T2",
"15.5(1)T3",
"15.5(2)T1",
"15.5(2)T2",
"15.5(2)T3",
"15.5(2)T4",
"15.5(1)T4",
"15.4(2)SN",
"15.4(2)SN1",
"15.4(3)SN1",
"15.4(3)SN1a",
"15.3(3)JN",
"15.3(3)JN1",
"15.3(3)JN2",
"15.3(3)JN3",
"15.3(3)JN4",
"15.3(3)JN6",
"15.3(3)JN7",
"15.3(3)JN8",
"15.5(3)M",
"15.5(3)M1",
"15.5(3)M0a",
"15.5(3)M2",
"15.5(3)M2a",
"15.5(3)M3",
"15.5(3)M4",
"15.5(3)M4a",
"15.5(3)M4b",
"15.5(3)M4c",
"12.2(33)SCI",
"12.2(33)SCI1",
"12.2(33)SCI1a",
"12.2(33)SCI2",
"12.2(33)SCI3",
"12.2(33)SCI2a",
"15.3(3)JA",
"15.3(3)JA1n",
"15.3(3)JA1m",
"15.3(3)JA1",
"15.3(3)JA2",
"15.3(3)JA3",
"15.3(3)JA4",
"15.3(3)JA5",
"15.3(3)JA6",
"15.3(3)JA7",
"15.3(3)JA8",
"15.3(3)JA10",
"15.3(3)JAA",
"15.3(3)JAA1",
"15.3(3)JAB",
"15.3(3)JB",
"15.5(1)SN",
"15.5(1)SN1",
"15.5(2)SN",
"15.5(3)SN0a",
"15.5(3)SN",
"15.0(2)SQD",
"15.0(2)SQD1",
"15.0(2)SQD2",
"15.0(2)SQD3",
"15.0(2)SQD4",
"15.6(1)S",
"15.6(2)S",
"15.6(1)S1",
"15.6(2)S2",
"15.6(2)S4",
"15.6(1)T",
"15.6(2)T",
"15.6(1)T0a",
"15.6(1)T1",
"15.6(1)T2",
"15.6(2)T0a",
"15.6(1)T3",
"15.3(3)JNB",
"15.3(3)JNB1",
"15.3(3)JNB2",
"15.3(3)JNB3",
"15.3(3)JAX",
"15.3(3)JAX1",
"15.3(3)JAX2",
"15.3(3)JBB",
"15.3(3)JBB1",
"15.3(3)JBB2",
"15.3(3)JBB4",
"15.3(3)JBB5",
"15.3(3)JBB6",
"15.3(3)JBB8",
"15.3(3)JBB6a",
"15.3(3)JC",
"15.3(3)JC30",
"15.3(3)JC1",
"15.3(3)JC2",
"15.3(3)JC3",
"15.3(3)JC4",
"15.3(3)JNC",
"15.3(3)JNC1",
"15.3(3)JNC2",
"15.3(3)JNC3",
"12.2(33)SCJ",
"12.2(33)SCJ1a",
"12.2(33)SCJ2",
"12.2(33)SCJ2a",
"15.3(3)JNP",
"15.3(3)JNP1",
"15.3(3)JNP3",
"15.5(2)XB",
"15.6(1)SN",
"15.6(1)SN1",
"15.6(1)SN2",
"15.6(1)SN3",
"15.6(5)SN",
"15.3(3)JPB",
"15.3(3)JD",
"15.3(3)JD2",
"15.3(3)JPC",
"15.3(3)JPC1",
"15.3(3)JND",
"15.7(3)M0a"
);
workarounds = make_list(CISCO_WORKAROUNDS['L2TP_check']);
workaround_params = make_list();
reporting = make_array(
'port' , 0,
'severity' , SECURITY_HOLE,
'version' , product_info['version'],
'bug_id' , "CSCuy82078",
'cmds' , make_list("show running-config")
);
cisco::check_and_report(product_info:product_info, workarounds:workarounds, workaround_params:workaround_params, reporting:reporting, vuln_versions:version_list);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo