CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
33.5%
According to its self-reported version, Cisco IOS is affected by a vulnerability.
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
#TRUSTED 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
#TRUST-RSA-SHA256 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
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(192250);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/26");
script_cve_id("CVE-2023-20186");
script_xref(name:"CISCO-BUG-ID", value:"CSCwe55871");
script_xref(name:"CISCO-SA", value:"cisco-sa-aaascp-Tyj4fEJm");
script_xref(name:"IAVA", value:"2023-A-0510-S");
script_name(english:"Cisco IOS Software Command Authorization Bypass (cisco-sa-aaascp-Tyj4fEJm)");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco IOS is affected by a vulnerability.
- A vulnerability in the Authentication, Authorization, and Accounting (AAA) feature of Cisco IOS Software
and Cisco IOS XE Software could allow an authenticated, remote attacker to bypass command authorization
and copy files to or from the file system of an affected device using the Secure Copy Protocol (SCP). This
vulnerability is due to incorrect processing of SCP commands in AAA command authorization checks. An
attacker with valid credentials and level 15 privileges could exploit this vulnerability by using SCP to
connect to an affected device from an external machine. A successful exploit could allow the attacker to
obtain or change the configuration of the affected device and put files on or retrieve files from the
affected device. (CVE-2023-20186)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.");
# https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaascp-Tyj4fEJm
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6736c09f");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe55871");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwe55871");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-20186");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/09/27");
script_set_attribute(attribute:"patch_publication_date", value:"2023/09/27");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/03/19");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ios_version.nasl");
script_require_keys("Host/Cisco/IOS/Version");
exit(0);
}
include('cisco_workarounds.inc');
include('ccf.inc');
var product_info = cisco::get_product_info(name:'Cisco IOS');
var version_list=make_list(
'12.2(6)I1',
'12.2(58)EX',
'12.2(58)EY',
'12.2(58)EY1',
'12.2(58)EY2',
'12.2(58)EZ',
'12.2(58)SE',
'12.2(58)SE1',
'12.2(58)SE2',
'12.2(60)EZ',
'12.2(60)EZ1',
'12.2(60)EZ2',
'12.2(60)EZ3',
'12.2(60)EZ4',
'12.2(60)EZ5',
'12.2(60)EZ6',
'12.2(60)EZ7',
'12.2(60)EZ8',
'12.2(60)EZ9',
'12.2(60)EZ10',
'12.2(60)EZ11',
'12.2(60)EZ12',
'12.2(60)EZ13',
'12.2(60)EZ14',
'12.2(60)EZ15',
'15.0(1)EX',
'15.0(1)EY',
'15.0(1)EY1',
'15.0(1)EY2',
'15.0(1)M',
'15.0(1)M1',
'15.0(1)M2',
'15.0(1)M3',
'15.0(1)M4',
'15.0(1)M5',
'15.0(1)M6',
'15.0(1)M6a',
'15.0(1)M7',
'15.0(1)M8',
'15.0(1)M9',
'15.0(1)M10',
'15.0(1)MR',
'15.0(1)S',
'15.0(1)S1',
'15.0(1)S2',
'15.0(1)S3a',
'15.0(1)S4',
'15.0(1)S4a',
'15.0(1)S5',
'15.0(1)S6',
'15.0(1)SE',
'15.0(1)SE1',
'15.0(1)SE2',
'15.0(1)SE3',
'15.0(1)XA',
'15.0(1)XA1',
'15.0(1)XA2',
'15.0(1)XA3',
'15.0(1)XA4',
'15.0(1)XA5',
'15.0(2)EA',
'15.0(2)EA1',
'15.0(2)EJ',
'15.0(2)EJ1',
'15.0(2)EK',
'15.0(2)EK1',
'15.0(2)EX',
'15.0(2)EX1',
'15.0(2)EX2',
'15.0(2)EX3',
'15.0(2)EX4',
'15.0(2)EX5',
'15.0(2)EX6',
'15.0(2)EX7',
'15.0(2)EX8',
'15.0(2)EX10',
'15.0(2)EX11',
'15.0(2)EX12',
'15.0(2)EX13',
'15.0(2)EY',
'15.0(2)EY1',
'15.0(2)EY2',
'15.0(2)EY3',
'15.0(2)EZ',
'15.0(2)MR',
'15.0(2)SE',
'15.0(2)SE1',
'15.0(2)SE2',
'15.0(2)SE3',
'15.0(2)SE4',
'15.0(2)SE5',
'15.0(2)SE6',
'15.0(2)SE7',
'15.0(2)SE8',
'15.0(2)SE9',
'15.0(2)SE10',
'15.0(2)SE10a',
'15.0(2)SE11',
'15.0(2)SE12',
'15.0(2)SE13',
'15.0(2)SE13a',
'15.0(2)SE13b',
'15.0(2)SE13c',
'15.0(2)SE13d',
'15.0(2a)EX5',
'15.0(2a)SE9',
'15.1(1)S',
'15.1(1)S1',
'15.1(1)S2',
'15.1(1)SG',
'15.1(1)SG1',
'15.1(1)SG2',
'15.1(1)SY',
'15.1(1)SY1',
'15.1(1)SY2',
'15.1(1)SY3',
'15.1(1)SY4',
'15.1(1)SY5',
'15.1(1)SY6',
'15.1(1)T',
'15.1(1)T1',
'15.1(1)T2',
'15.1(1)T3',
'15.1(1)T4',
'15.1(1)T5',
'15.1(1)XB',
'15.1(1)XB1',
'15.1(1)XB2',
'15.1(1)XB3',
'15.1(2)GC',
'15.1(2)GC1',
'15.1(2)GC2',
'15.1(2)S',
'15.1(2)S1',
'15.1(2)S2',
'15.1(2)SG',
'15.1(2)SG1',
'15.1(2)SG2',
'15.1(2)SG3',
'15.1(2)SG4',
'15.1(2)SG5',
'15.1(2)SG6',
'15.1(2)SG7',
'15.1(2)SG8',
'15.1(2)SY',
'15.1(2)SY1',
'15.1(2)SY2',
'15.1(2)SY3',
'15.1(2)SY4',
'15.1(2)SY4a',
'15.1(2)SY5',
'15.1(2)SY6',
'15.1(2)SY7',
'15.1(2)SY8',
'15.1(2)SY9',
'15.1(2)SY10',
'15.1(2)SY11',
'15.1(2)SY12',
'15.1(2)SY13',
'15.1(2)SY14',
'15.1(2)SY15',
'15.1(2)SY16',
'15.1(2)SY16a',
'15.1(2)SY16b',
'15.1(2)T',
'15.1(2)T0a',
'15.1(2)T1',
'15.1(2)T2',
'15.1(2)T2a',
'15.1(2)T3',
'15.1(2)T4',
'15.1(2)T5',
'15.1(3)MRA',
'15.1(3)MRA1',
'15.1(3)MRA2',
'15.1(3)MRA3',
'15.1(3)MRA4',
'15.1(3)S',
'15.1(3)S0a',
'15.1(3)S1',
'15.1(3)S2',
'15.1(3)S3',
'15.1(3)S4',
'15.1(3)S5',
'15.1(3)S5a',
'15.1(3)S6',
'15.1(3)S7',
'15.1(3)SVB1',
'15.1(3)SVB2',
'15.1(3)SVD',
'15.1(3)SVD1',
'15.1(3)SVD2',
'15.1(3)SVD3',
'15.1(3)SVE',
'15.1(3)SVF',
'15.1(3)SVF1',
'15.1(3)SVF2',
'15.1(3)SVF2a',
'15.1(3)SVF4b',
'15.1(3)SVF4c',
'15.1(3)SVF4d',
'15.1(3)SVF4e',
'15.1(3)SVF4f',
'15.1(3)SVG',
'15.1(3)SVG1a',
'15.1(3)SVG1b',
'15.1(3)SVG1c',
'15.1(3)SVG2',
'15.1(3)SVG2a',
'15.1(3)SVG3',
'15.1(3)SVG3a',
'15.1(3)SVG3b',
'15.1(3)SVG3c',
'15.1(3)SVH',
'15.1(3)SVH2',
'15.1(3)SVH4',
'15.1(3)SVH4a',
'15.1(3)SVI1a',
'15.1(3)SVI2',
'15.1(3)SVI2a',
'15.1(3)SVI3',
'15.1(3)SVI3b',
'15.1(3)SVI3c',
'15.1(3)SVI31a',
'15.1(3)SVI31b',
'15.1(3)SVJ',
'15.1(3)SVJ2',
'15.1(3)SVR1',
'15.1(3)SVR2',
'15.1(3)SVR3',
'15.1(3)SVR10',
'15.1(3)SVS',
'15.1(3)SVS1',
'15.1(3)SVT1',
'15.1(3)SVT2',
'15.1(3)SVT3',
'15.1(3)SVT4',
'15.1(3)SVU1',
'15.1(3)SVU2',
'15.1(3)SVU10',
'15.1(3)SVU11',
'15.1(3)SVU20',
'15.1(3)SVU21',
'15.1(3)SVV1',
'15.1(3)SVV2',
'15.1(3)SVV3',
'15.1(3)SVV4',
'15.1(3)SVW',
'15.1(3)SVW1',
'15.1(3)SVX',
'15.1(3)SVX1',
'15.1(3)T',
'15.1(3)T1',
'15.1(3)T2',
'15.1(3)T3',
'15.1(3)T4',
'15.1(4)GC',
'15.1(4)GC1',
'15.1(4)GC2',
'15.1(4)M',
'15.1(4)M0a',
'15.1(4)M0b',
'15.1(4)M1',
'15.1(4)M2',
'15.1(4)M3',
'15.1(4)M3a',
'15.1(4)M4',
'15.1(4)M5',
'15.1(4)M6',
'15.1(4)M7',
'15.1(4)M8',
'15.1(4)M9',
'15.1(4)M10',
'15.1(4)M12a',
'15.1(4)XB4',
'15.1(4)XB5',
'15.1(4)XB5a',
'15.1(4)XB6',
'15.1(4)XB7',
'15.1(4)XB8',
'15.1(4)XB8a',
'15.2(1)E',
'15.2(1)E1',
'15.2(1)E2',
'15.2(1)E3',
'15.2(1)EY',
'15.2(1)GC',
'15.2(1)GC1',
'15.2(1)GC2',
'15.2(1)S',
'15.2(1)S1',
'15.2(1)S2',
'15.2(1)SC1a',
'15.2(1)SD1',
'15.2(1)SD2',
'15.2(1)SD3',
'15.2(1)SD4',
'15.2(1)SD6',
'15.2(1)SD6a',
'15.2(1)SD7',
'15.2(1)SD8',
'15.2(1)SY',
'15.2(1)SY0a',
'15.2(1)SY1',
'15.2(1)SY1a',
'15.2(1)SY2',
'15.2(1)SY3',
'15.2(1)SY4',
'15.2(1)SY5',
'15.2(1)SY6',
'15.2(1)SY7',
'15.2(1)SY8',
'15.2(2)E',
'15.2(2)E1',
'15.2(2)E2',
'15.2(2)E3',
'15.2(2)E4',
'15.2(2)E5',
'15.2(2)E5a',
'15.2(2)E5b',
'15.2(2)E6',
'15.2(2)E7',
'15.2(2)E7b',
'15.2(2)E8',
'15.2(2)E9',
'15.2(2)E9a',
'15.2(2)E10',
'15.2(2)E10a',
'15.2(2)E10b',
'15.2(2)E10c',
'15.2(2)E10d',
'15.2(2)EA',
'15.2(2)EA1',
'15.2(2)EA2',
'15.2(2)EA3',
'15.2(2)EB',
'15.2(2)EB1',
'15.2(2)EB2',
'15.2(2)GC',
'15.2(2)S',
'15.2(2)S0a',
'15.2(2)S0c',
'15.2(2)S0d',
'15.2(2)S1',
'15.2(2)S2',
'15.2(2)SC',
'15.2(2)SC1',
'15.2(2)SC3',
'15.2(2)SC4',
'15.2(2)SY',
'15.2(2)SY1',
'15.2(2)SY2',
'15.2(2)SY3',
'15.2(2a)E1',
'15.2(2a)E2',
'15.2(2b)E',
'15.2(3)E',
'15.2(3)E1',
'15.2(3)E2',
'15.2(3)E3',
'15.2(3)E4',
'15.2(3)E5',
'15.2(3)EA',
'15.2(3)GC',
'15.2(3)GC1',
'15.2(3a)E',
'15.2(3m)E2',
'15.2(3m)E7',
'15.2(3m)E8',
'15.2(4)E',
'15.2(4)E1',
'15.2(4)E2',
'15.2(4)E3',
'15.2(4)E4',
'15.2(4)E5',
'15.2(4)E5a',
'15.2(4)E6',
'15.2(4)E7',
'15.2(4)E8',
'15.2(4)E9',
'15.2(4)E10',
'15.2(4)E10a',
'15.2(4)E10b',
'15.2(4)E10c',
'15.2(4)E10d',
'15.2(4)E10e',
'15.2(4)EA',
'15.2(4)EA1',
'15.2(4)EA2',
'15.2(4)EA3',
'15.2(4)EA4',
'15.2(4)EA5',
'15.2(4)EA6',
'15.2(4)EA7',
'15.2(4)EA8',
'15.2(4)EA9',
'15.2(4)EA9a',
'15.2(4)EC1',
'15.2(4)EC2',
'15.2(4)GC',
'15.2(4)GC1',
'15.2(4)GC2',
'15.2(4)GC3',
'15.2(4)M',
'15.2(4)M1',
'15.2(4)M2',
'15.2(4)M3',
'15.2(4)M4',
'15.2(4)M5',
'15.2(4)M6',
'15.2(4)M6a',
'15.2(4)M6b',
'15.2(4)M7',
'15.2(4)M8',
'15.2(4)M9',
'15.2(4)M10',
'15.2(4)M11',
'15.2(4)S',
'15.2(4)S0c',
'15.2(4)S1',
'15.2(4)S1c',
'15.2(4)S2',
'15.2(4)S3',
'15.2(4)S3a',
'15.2(4)S4',
'15.2(4)S4a',
'15.2(4)S5',
'15.2(4)S6',
'15.2(4)S7',
'15.2(4)S8',
'15.2(4m)E1',
'15.2(4m)E2',
'15.2(4m)E3',
'15.2(4n)E2',
'15.2(4o)E2',
'15.2(4o)E3',
'15.2(4p)E1',
'15.2(4q)E1',
'15.2(4s)E1',
'15.2(5)E',
'15.2(5)E1',
'15.2(5)E2',
'15.2(5)E2b',
'15.2(5)E2c',
'15.2(5)EA',
'15.2(5)EX',
'15.2(5a)E',
'15.2(5a)E1',
'15.2(5b)E',
'15.2(5c)E',
'15.2(6)E',
'15.2(6)E0a',
'15.2(6)E0c',
'15.2(6)E1',
'15.2(6)E1a',
'15.2(6)E1s',
'15.2(6)E2',
'15.2(6)E2a',
'15.2(6)E2b',
'15.2(6)E3',
'15.2(6)EB',
'15.2(7)E',
'15.2(7)E0a',
'15.2(7)E0b',
'15.2(7)E0s',
'15.2(7)E1',
'15.2(7)E1a',
'15.2(7)E2',
'15.2(7)E2a',
'15.2(7)E2b',
'15.2(7)E3',
'15.2(7)E3k',
'15.2(7)E4',
'15.2(7)E5',
'15.2(7)E6',
'15.2(7)E7',
'15.2(7)E8',
'15.2(7a)E0b',
'15.2(7b)E0b',
'15.2(8)E',
'15.2(8)E1',
'15.2(8)E2',
'15.2(8)E3',
'15.3(0)SY',
'15.3(1)S',
'15.3(1)S1',
'15.3(1)S1e',
'15.3(1)S2',
'15.3(1)SY',
'15.3(1)SY1',
'15.3(1)SY2',
'15.3(1)T',
'15.3(1)T1',
'15.3(1)T2',
'15.3(1)T3',
'15.3(1)T4',
'15.3(2)S',
'15.3(2)S1',
'15.3(2)S2',
'15.3(2)T',
'15.3(2)T1',
'15.3(2)T2',
'15.3(2)T3',
'15.3(2)T4',
'15.3(3)JPI11',
'15.3(3)M',
'15.3(3)M1',
'15.3(3)M2',
'15.3(3)M3',
'15.3(3)M4',
'15.3(3)M5',
'15.3(3)M6',
'15.3(3)M7',
'15.3(3)M8',
'15.3(3)M8a',
'15.3(3)M9',
'15.3(3)M10',
'15.3(3)S',
'15.3(3)S1',
'15.3(3)S1a',
'15.3(3)S2',
'15.3(3)S2a',
'15.3(3)S3',
'15.3(3)S4',
'15.3(3)S5',
'15.3(3)S6',
'15.3(3)S6a',
'15.3(3)S7',
'15.3(3)S8',
'15.3(3)S8a',
'15.3(3)S9',
'15.3(3)S10',
'15.3(3)XB12',
'15.4(1)CG',
'15.4(1)CG1',
'15.4(1)S',
'15.4(1)S1',
'15.4(1)S2',
'15.4(1)S3',
'15.4(1)S4',
'15.4(1)SY',
'15.4(1)SY1',
'15.4(1)SY2',
'15.4(1)SY3',
'15.4(1)SY4',
'15.4(1)T',
'15.4(1)T1',
'15.4(1)T2',
'15.4(1)T3',
'15.4(1)T4',
'15.4(2)CG',
'15.4(2)S',
'15.4(2)S1',
'15.4(2)S2',
'15.4(2)S3',
'15.4(2)S4',
'15.4(2)SN',
'15.4(2)SN1',
'15.4(2)T',
'15.4(2)T1',
'15.4(2)T2',
'15.4(2)T3',
'15.4(2)T4',
'15.4(3)M',
'15.4(3)M1',
'15.4(3)M2',
'15.4(3)M3',
'15.4(3)M4',
'15.4(3)M5',
'15.4(3)M6',
'15.4(3)M6a',
'15.4(3)M7',
'15.4(3)M7a',
'15.4(3)M8',
'15.4(3)M9',
'15.4(3)M10',
'15.4(3)S',
'15.4(3)S0d',
'15.4(3)S0e',
'15.4(3)S0f',
'15.4(3)S1',
'15.4(3)S2',
'15.4(3)S3',
'15.4(3)S4',
'15.4(3)S5',
'15.4(3)S6',
'15.4(3)S6a',
'15.4(3)S7',
'15.4(3)S8',
'15.4(3)S9',
'15.4(3)S10',
'15.4(3)SN1',
'15.4(3)SN1a',
'15.5(1)S',
'15.5(1)S1',
'15.5(1)S2',
'15.5(1)S3',
'15.5(1)S4',
'15.5(1)SN',
'15.5(1)SN1',
'15.5(1)SY',
'15.5(1)SY1',
'15.5(1)SY2',
'15.5(1)SY3',
'15.5(1)SY4',
'15.5(1)SY5',
'15.5(1)SY6',
'15.5(1)SY7',
'15.5(1)SY8',
'15.5(1)SY9',
'15.5(1)SY10',
'15.5(1)SY11',
'15.5(1)T',
'15.5(1)T1',
'15.5(1)T2',
'15.5(1)T3',
'15.5(1)T4',
'15.5(2)S',
'15.5(2)S1',
'15.5(2)S2',
'15.5(2)S3',
'15.5(2)S4',
'15.5(2)SN',
'15.5(2)T',
'15.5(2)T1',
'15.5(2)T2',
'15.5(2)T3',
'15.5(2)T4',
'15.5(2)XB',
'15.5(3)M',
'15.5(3)M0a',
'15.5(3)M1',
'15.5(3)M2',
'15.5(3)M2a',
'15.5(3)M3',
'15.5(3)M4',
'15.5(3)M4a',
'15.5(3)M4b',
'15.5(3)M4c',
'15.5(3)M5',
'15.5(3)M6',
'15.5(3)M6a',
'15.5(3)M7',
'15.5(3)M8',
'15.5(3)M9',
'15.5(3)M10',
'15.5(3)M11',
'15.5(3)M11a',
'15.5(3)M11b',
'15.5(3)S',
'15.5(3)S0a',
'15.5(3)S1',
'15.5(3)S1a',
'15.5(3)S2',
'15.5(3)S3',
'15.5(3)S4',
'15.5(3)S5',
'15.5(3)S6',
'15.5(3)S6a',
'15.5(3)S6b',
'15.5(3)S7',
'15.5(3)S8',
'15.5(3)S9',
'15.5(3)S9a',
'15.5(3)S10',
'15.5(3)S10a',
'15.5(3)S10b',
'15.5(3)S10c',
'15.5(3)SN',
'15.5(3)SN0a',
'15.6(1)S',
'15.6(1)S1',
'15.6(1)S2',
'15.6(1)S3',
'15.6(1)S4',
'15.6(1)SN',
'15.6(1)SN1',
'15.6(1)SN2',
'15.6(1)SN3',
'15.6(1)T',
'15.6(1)T0a',
'15.6(1)T1',
'15.6(1)T2',
'15.6(1)T3',
'15.6(2)S',
'15.6(2)S1',
'15.6(2)S2',
'15.6(2)S3',
'15.6(2)S4',
'15.6(2)SN',
'15.6(2)SP',
'15.6(2)SP1',
'15.6(2)SP2',
'15.6(2)SP3',
'15.6(2)SP4',
'15.6(2)SP5',
'15.6(2)SP6',
'15.6(2)SP7',
'15.6(2)SP8',
'15.6(2)SP8a',
'15.6(2)SP9',
'15.6(2)SP10',
'15.6(2)T',
'15.6(2)T0a',
'15.6(2)T1',
'15.6(2)T2',
'15.6(2)T3',
'15.6(3)M',
'15.6(3)M0a',
'15.6(3)M1',
'15.6(3)M1a',
'15.6(3)M1b',
'15.6(3)M2',
'15.6(3)M2a',
'15.6(3)M3',
'15.6(3)M3a',
'15.6(3)M4',
'15.6(3)M5',
'15.6(3)M6',
'15.6(3)M6a',
'15.6(3)M6b',
'15.6(3)M7',
'15.6(3)M8',
'15.6(3)M9',
'15.6(3)SN',
'15.6(4)SN',
'15.6(5)SN',
'15.6(7)SN',
'15.6(7)SN1',
'15.6(7)SN2',
'15.7(3)M',
'15.7(3)M0a',
'15.7(3)M1',
'15.7(3)M2',
'15.7(3)M3',
'15.7(3)M4',
'15.7(3)M4a',
'15.7(3)M4b',
'15.7(3)M5',
'15.7(3)M6',
'15.7(3)M7',
'15.7(3)M8',
'15.7(3)M9',
'15.7(3)M10',
'15.8(3)M',
'15.8(3)M0a',
'15.8(3)M0b',
'15.8(3)M1',
'15.8(3)M1a',
'15.8(3)M2',
'15.8(3)M2a',
'15.8(3)M3',
'15.8(3)M3a',
'15.8(3)M3b',
'15.8(3)M4',
'15.8(3)M5',
'15.8(3)M6',
'15.8(3)M7',
'15.8(3)M8',
'15.8(3)M9',
'15.8(3)M10',
'15.9(3)M',
'15.9(3)M0a',
'15.9(3)M1',
'15.9(3)M2',
'15.9(3)M2a',
'15.9(3)M3',
'15.9(3)M3a',
'15.9(3)M3b',
'15.9(3)M4',
'15.9(3)M4a',
'15.9(3)M5',
'15.9(3)M6',
'15.9(3)M6a',
'15.9(3)M6b',
'15.9(3)M7',
'15.9(3)M7a'
);
var workarounds = make_list(CISCO_WORKAROUNDS['generic_workaround']);
var workaround_params = [
WORKAROUND_CONFIG['scp_server'],
WORKAROUND_CONFIG['aaa_authorization_commands'],
{'require_all_generic_workarounds': TRUE}
];
var reporting = make_array(
'port' , product_info['port'],
'severity', SECURITY_HOLE,
'version' , product_info['version'],
'bug_id' , 'CSCwe55871',
'cmds' , make_list('show running-config'),
'fix' , 'See vendor advisory'
);
cisco::check_and_report(
product_info:product_info,
workarounds:workarounds,
workaround_params:workaround_params,
reporting:reporting,
vuln_versions:version_list
);
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
33.5%