Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO-SA-DNAC-INFODISC-PE7ZABDR.NASL
HistoryMay 19, 2023 - 12:00 a.m.

Cisco DNA Center Information Disclosure (cisco-sa-dnac-infodisc-pe7zAbdR)

2023-05-1900:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
9
cisco dna center
information disclosure
vulnerability
pnp operation
configuration files
role-based access control
remote attack
api
clear text
nessus scanner

0.001 Low

EPSS

Percentile

33.9%

The version of Cisco DNA Center installed on the remote host is prior to 2.3.3.7 or is 2.3.5.0. It may, therefore, be affected by an information disclosure vulnerability if configured for PnP operation and to push configuration files to other Cisco external devices on the network. Due to improper role-based access control with the integration of PnP, an authenticated, remote attacker may be able to send a query to an internal API allowing the attacker to view sensitive information in clear text, including configuration files.

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(176115);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/05/22");

  script_cve_id("CVE-2023-20059");
  script_xref(name:"CISCO-BUG-ID", value:"CSCwd19443");
  script_xref(name:"CISCO-SA", value:"cisco-sa-dnac-infodisc-pe7zAbdR");
  script_xref(name:"IAVA", value:"2023-A-0155");

  script_name(english:"Cisco DNA Center Information Disclosure (cisco-sa-dnac-infodisc-pe7zAbdR)");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"The version of Cisco DNA Center installed on the remote host is prior to 2.3.3.7 or is 2.3.5.0. It may, therefore,
be affected by an information disclosure vulnerability if configured for PnP operation and to push configuration files
to other Cisco external devices on the network. Due to improper role-based access control with the integration of PnP,
an authenticated, remote attacker may be able to send a query to an internal API allowing the attacker to view
sensitive information in clear text, including configuration files.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
  # https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-infodisc-pe7zAbdR
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ff72bd8a");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd19443");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwd19443");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-20059");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2023/03/22");
  script_set_attribute(attribute:"patch_publication_date", value:"2023/03/22");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/05/19");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:digital_network_architecture_center");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_dna_center_web_detect.nbin");
  script_require_keys("installed_sw/Cisco DNA Center");

  exit(0);
}

include('vcf.inc');

var app_info = vcf::combined_get_app_info(app:'Cisco DNA Center');

vcf::check_granularity(app_info:app_info, sig_segments:4);
var constraints = [
  {'fixed_version': '2.3.3.7'},
  {'min_version': '2.3.4', 'fixed_version': '2.3.5.0'}
];

# Requiring paranoia due to the requirement that PnP be enabled and
# configured in a specific way
vcf::check_version_and_report(
  app_info:app_info,
  constraints:constraints,
  severity:SECURITY_WARNING,
  require_paranoia:TRUE
);
VendorProductVersionCPE
ciscodigital_network_architecture_centercpe:/a:cisco:digital_network_architecture_center

0.001 Low

EPSS

Percentile

33.9%

Related for CISCO-SA-DNAC-INFODISC-PE7ZABDR.NASL