Lucene search

K
nessusThis script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO-SA-20190925-XR-ASR9K-PRIVESC.NASL
HistoryFeb 28, 2020 - 12:00 a.m.

Cisco IOS XR Software for Cisco ASR 9000 VMAN CLI Privilege Escalation (cisco-sa-20190925-xr-asr9k-privesc)

2020-02-2800:00:00
This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
30

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.2%

According to its self-reported version, Cisco IOS XR Software is affected by a privilege escalation vulnerability in a CLI command related to the virtualization manager (VMAN) for Cisco ASR 9000 Series Aggregation Services Routers. This is due to insufficient validation of arguments passed to a specific VMAN CLI command on an affected device. An authenticated, local attacker can exploit this, by including malicious input as the argument of an affected command, in order to run arbitrary commands on the underlying operating system with root privileges, which may lead to complete system compromise.

Please see the included Cisco BIDs and Cisco Security Advisory for more information

#TRUSTED 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
#
# (C) Tenable Network Security, Inc.
#

include('compat.inc');

if (description)
{
  script_id(134108);
  script_version("1.6");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/04/08");

  script_cve_id("CVE-2019-12709");
  script_xref(name:"CISCO-BUG-ID", value:"CSCvo19278");
  script_xref(name:"CISCO-SA", value:"cisco-sa-20190925-xr-asr9k-privesc");

  script_name(english:"Cisco IOS XR Software for Cisco ASR 9000 VMAN CLI Privilege Escalation (cisco-sa-20190925-xr-asr9k-privesc)");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco IOS XR Software is affected by a privilege escalation vulnerability in a
CLI command related to the virtualization manager (VMAN) for Cisco ASR 9000 Series Aggregation Services Routers. This is
due to insufficient validation of arguments passed to a specific VMAN CLI command on an affected device. An
authenticated, local attacker can exploit this, by including malicious input as the argument of an affected command, in
order to run arbitrary commands on the underlying operating system with root privileges, which may lead to complete
system compromise.

Please see the included Cisco BIDs and Cisco Security Advisory for more information");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-xr-asr9k-privesc
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?e9a9770a");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvo19278");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvo19278");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-12709");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_cwe_id(78);

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/09/25");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/02/28");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios_xr");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_ios_xr_version.nasl");
  script_require_keys("Host/Cisco/IOS-XR/Version");

  exit(0);
}

include('audit.inc');
include('cisco_workarounds.inc');
include('ccf.inc');

product_info = cisco::get_product_info(name:'Cisco IOS XR');

if ('ASR9' >!< product_info['model'])
  audit(AUDIT_HOST_NOT, 'affected');

vuln_ranges = [
  {'min_ver' : '5.1.0', 'fix_ver' : '6.5.3'},
  {'min_ver' : '6.6.0', 'fix_ver' : '6.6.2'}
];

workarounds = make_list(CISCO_WORKAROUNDS['no_workaround']);
workaround_params = make_list();


reporting = make_array(
  'port'     , product_info['port'],
  'severity' , SECURITY_HOLE,
  'version'  , product_info['version'],
  'bug_id'   , 'CSCvo19278'
);

cisco::check_and_report(
  product_info:product_info,
  workarounds:workarounds,
  workaround_params:workaround_params,
  reporting:reporting,
  vuln_ranges:vuln_ranges,
  router_only:TRUE
);

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.2%

Related for CISCO-SA-20190925-XR-ASR9K-PRIVESC.NASL