Cisco IOS XE Software Unified Threat Defense Denial of Service Vulnerability

2019-10-03T00:00:00
ID CISCO-SA-20190925-UTD.NASL
Type nessus
Reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
Modified 2020-02-02T00:00:00

Description

According to its self-reported version, Cisco IOS XE Software is affected by a vulnerability. Please see the included Cisco BIDs and Cisco Security Advisory for more information

                                        
                                            #TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(129532);
  script_version("1.6");
  script_cvs_date("Date: 2019/12/20");

  script_cve_id("CVE-2019-12657");
  script_xref(name:"CISCO-BUG-ID", value:"CSCvn29244");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20190925-utd");

  script_name(english:"Cisco IOS XE Software Unified Threat Defense Denial of Service Vulnerability");
  script_summary(english:"Checks the version of Cisco IOS XE Software");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco IOS XE Software is affected by a vulnerability.
Please see the included Cisco BIDs and Cisco Security Advisory for more information");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-utd
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1237229e");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn29244");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvn29244");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-12657");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_cwe_id(20);

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/09/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/10/03");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios_xe");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_ios_xe_version.nasl");
  script_require_keys("Host/Cisco/IOS-XE/Version", "Settings/ParanoidReport");

  exit(0);
}

include('audit.inc');
include('cisco_workarounds.inc');
include('ccf.inc');

if (report_paranoia < 2) audit(AUDIT_PARANOID);

product_info = cisco::get_product_info(name:'Cisco IOS XE Software');

version_list=make_list(
  '3.17.4S',
  '3.17.3S',
  '3.17.2S ',
  '3.17.1S',
  '3.17.0S',
  '3.16.8S',
  '3.16.7bS',
  '3.16.7aS',
  '3.16.7S',
  '3.16.6bS',
  '3.16.6S',
  '3.16.5bS',
  '3.16.5aS',
  '3.16.5S',
  '3.16.4gS',
  '3.16.4eS',
  '3.16.4dS',
  '3.16.4cS',
  '3.16.4bS',
  '3.16.4aS',
  '3.16.3S',
  '3.16.2S',
  '3.16.1aS',
  '3.16.0cS',
  '3.16.0S',
  '16.9.2s',
  '16.9.2',
  '16.9.1s',
  '16.9.1a',
  '16.9.1',
  '16.8.3',
  '16.8.2',
  '16.8.1s',
  '16.8.1c',
  '16.8.1a',
  '16.8.1',
  '16.7.3',
  '16.7.2',
  '16.7.1',
  '16.6.5',
  '16.6.4s',
  '16.6.4',
  '16.6.3',
  '16.6.2',
  '16.6.1',
  '16.5.3',
  '16.5.2',
  '16.5.1b',
  '16.5.1',
  '16.4.3',
  '16.4.2',
  '16.4.1',
  '16.3.7',
  '16.3.6',
  '16.3.5',
  '16.3.4',
  '16.3.3',
  '16.3.2',
  '16.3.1a',
  '16.3.1',
  '16.2.2',
  '16.2.1',
  '16.10.1s',
  '16.10.1e',
  '16.10.1b',
  '16.10.1a',
  '16.10.1'
);

workarounds = make_list(CISCO_WORKAROUNDS['no_workaround']);
workaround_params = make_list();


reporting = make_array(
'port'     , 0,
'severity' , SECURITY_HOLE,
'version'  , product_info['version'],
'bug_id'   , 'CSCvn29244'
);

cisco::check_and_report(product_info:product_info, workarounds:workarounds, workaround_params:workaround_params, reporting:reporting, vuln_versions:version_list);