8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.1%
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities.
A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap overflow, resulting in an affected device reloading. This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic. (CVE-2024-20307)
A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap underflow, resulting in an affected device reloading. This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic…
(CVE-2024-20308)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
#TRUSTED 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
#TRUST-RSA-SHA256 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
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(198146);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/30");
script_cve_id("CVE-2024-20307", "CVE-2024-20308");
script_xref(name:"CISCO-BUG-ID", value:"CSCwf11183");
script_xref(name:"CISCO-BUG-ID", value:"CSCwh66334");
script_xref(name:"CISCO-SA", value:"cisco-sa-ikev1-NO2ccFWz");
script_name(english:"Cisco IOS Software Internet Key Exchange Version 1 Fragmentation DoS (cisco-sa-ikev1-NO2ccFWz)");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities.
- A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could
allow an unauthenticated, remote attacker to cause a heap overflow, resulting in an affected device
reloading. This vulnerability exists because crafted, fragmented IKEv1 packets are not properly
reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected
system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in
a DoS condition. Note: Only traffic that is directed to the affected system can be used to exploit this
vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic. (CVE-2024-20307)
- A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could
allow an unauthenticated, remote attacker to cause a heap underflow, resulting in an affected device
reloading. This vulnerability exists because crafted, fragmented IKEv1 packets are not properly
reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected
system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in
a denial of service (DoS) condition. Note: Only traffic that is directed to the affected system can be
used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic..
(CVE-2024-20308)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.");
# https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?edd2acb0");
# https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75056
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a1da659d");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf11183");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh66334");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwf11183, CSCwh66334");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-20308");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(121);
script_set_attribute(attribute:"vuln_publication_date", value:"2024/03/27");
script_set_attribute(attribute:"patch_publication_date", value:"2024/03/27");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/30");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ios_version.nasl");
script_require_keys("Host/Cisco/IOS/Version");
exit(0);
}
include('cisco_workarounds.inc');
include('ccf.inc');
var product_info = cisco::get_product_info(name:'Cisco IOS');
var version_list=make_list(
'12.2(6)I1',
'12.4(22)MD',
'12.4(22)MD1',
'12.4(22)MD2',
'12.4(22)MDA',
'12.4(22)MDA1',
'12.4(22)MDA2',
'12.4(22)MDA3',
'12.4(22)MDA4',
'12.4(22)MDA5',
'12.4(22)MDA6',
'12.4(22)T',
'12.4(22)T1',
'12.4(22)T2',
'12.4(22)T3',
'12.4(22)T4',
'12.4(22)T5',
'12.4(22)XR1',
'12.4(22)XR2',
'12.4(22)XR3',
'12.4(22)XR4',
'12.4(22)XR5',
'12.4(22)XR6',
'12.4(22)XR7',
'12.4(22)XR8',
'12.4(22)XR9',
'12.4(22)XR10',
'12.4(22)XR11',
'12.4(22)XR12',
'12.4(24)MD',
'12.4(24)MD1',
'12.4(24)MD2',
'12.4(24)MD3',
'12.4(24)MD4',
'12.4(24)MD5',
'12.4(24)MD6',
'12.4(24)MD7',
'12.4(24)MDA',
'12.4(24)MDA1',
'12.4(24)MDA2',
'12.4(24)MDA3',
'12.4(24)MDA4',
'12.4(24)MDA5',
'12.4(24)MDA6',
'12.4(24)MDA7',
'12.4(24)MDA8',
'12.4(24)MDA9',
'12.4(24)MDA10',
'12.4(24)MDA11',
'12.4(24)MDA12',
'12.4(24)MDA13',
'12.4(24)MDB',
'12.4(24)MDB1',
'12.4(24)MDB3',
'12.4(24)MDB4',
'12.4(24)MDB5',
'12.4(24)MDB5a',
'12.4(24)MDB6',
'12.4(24)MDB7',
'12.4(24)MDB8',
'12.4(24)MDB9',
'12.4(24)MDB10',
'12.4(24)MDB11',
'12.4(24)MDB12',
'12.4(24)MDB13',
'12.4(24)MDB14',
'12.4(24)MDB15',
'12.4(24)MDB16',
'12.4(24)MDB17',
'12.4(24)MDB18',
'12.4(24)MDB19',
'12.4(24)T',
'12.4(24)T1',
'12.4(24)T2',
'12.4(24)T3',
'12.4(24)T3e',
'12.4(24)T3f',
'12.4(24)T4',
'12.4(24)T4a',
'12.4(24)T4b',
'12.4(24)T4c',
'12.4(24)T4d',
'12.4(24)T4e',
'12.4(24)T4f',
'12.4(24)T4g',
'12.4(24)T4h',
'12.4(24)T4i',
'12.4(24)T4j',
'12.4(24)T4k',
'12.4(24)T4l',
'12.4(24)T4m',
'12.4(24)T4n',
'12.4(24)T4o',
'12.4(24)T5',
'12.4(24)T6',
'12.4(24)T7',
'12.4(24)T8',
'12.4(24)T9',
'12.4(24)T10',
'12.4(24)T11',
'12.4(24)T12',
'12.4(24)YG',
'12.4(24)YG1',
'12.4(24)YG2',
'12.4(24)YG3',
'12.4(24)YG4',
'12.4(24)YS',
'12.4(24)YS1',
'12.4(24)YS2',
'12.4(24)YS3',
'12.4(24)YS4',
'12.4(24)YS5',
'12.4(24)YS6',
'12.4(24)YS7',
'12.4(24)YS8',
'12.4(24)YS8a',
'12.4(24)YS9',
'12.4(24)YS10',
'15.0(1)M',
'15.0(1)M1',
'15.0(1)M2',
'15.0(1)M3',
'15.0(1)M4',
'15.0(1)M5',
'15.0(1)M6',
'15.0(1)M6a',
'15.0(1)M7',
'15.0(1)M8',
'15.0(1)M9',
'15.0(1)M10',
'15.0(1)XA',
'15.0(1)XA1',
'15.0(1)XA2',
'15.0(1)XA3',
'15.0(1)XA4',
'15.0(1)XA5',
'15.0(2)EJ',
'15.0(2)EJ1',
'15.0(2)EK',
'15.0(2)EK1',
'15.0(2)EX',
'15.0(2)EX1',
'15.0(2)EX2',
'15.0(2)EX3',
'15.0(2)EX4',
'15.0(2)EX5',
'15.0(2)EX6',
'15.0(2)EX7',
'15.0(2)EX8',
'15.0(2)EY',
'15.0(2)EY1',
'15.0(2)EY2',
'15.0(2)EY3',
'15.0(2)EZ',
'15.0(2)SE',
'15.0(2)SE1',
'15.0(2)SE2',
'15.0(2)SE3',
'15.0(2)SE4',
'15.0(2)SE5',
'15.0(2)SE6',
'15.0(2)SE7',
'15.0(2)SE8',
'15.0(2)SE9',
'15.0(2)SE10',
'15.0(2)SE10a',
'15.0(2)SE11',
'15.0(2)SE12',
'15.0(2)SE13',
'15.0(2)SE13a',
'15.0(2)SE13b',
'15.0(2)SE13c',
'15.0(2)SE13d',
'15.0(2a)EX5',
'15.0(2a)SE9',
'15.1(1)S',
'15.1(1)S1',
'15.1(1)S2',
'15.1(1)SG',
'15.1(1)SG1',
'15.1(1)SG2',
'15.1(1)SY',
'15.1(1)SY1',
'15.1(1)SY2',
'15.1(1)SY3',
'15.1(1)SY4',
'15.1(1)SY5',
'15.1(1)SY6',
'15.1(1)T',
'15.1(1)T1',
'15.1(1)T2',
'15.1(1)T3',
'15.1(1)T4',
'15.1(1)T5',
'15.1(1)XB',
'15.1(1)XB1',
'15.1(1)XB2',
'15.1(1)XB3',
'15.1(2)GC',
'15.1(2)GC1',
'15.1(2)GC2',
'15.1(2)S',
'15.1(2)S1',
'15.1(2)S2',
'15.1(2)SG',
'15.1(2)SG1',
'15.1(2)SG2',
'15.1(2)SG3',
'15.1(2)SG4',
'15.1(2)SG5',
'15.1(2)SG6',
'15.1(2)SG7',
'15.1(2)SG8',
'15.1(2)SY',
'15.1(2)SY1',
'15.1(2)SY2',
'15.1(2)SY3',
'15.1(2)SY4',
'15.1(2)SY4a',
'15.1(2)SY5',
'15.1(2)SY6',
'15.1(2)SY7',
'15.1(2)SY8',
'15.1(2)SY9',
'15.1(2)SY10',
'15.1(2)SY11',
'15.1(2)SY12',
'15.1(2)SY13',
'15.1(2)SY14',
'15.1(2)SY15',
'15.1(2)SY16',
'15.1(2)SY16a',
'15.1(2)SY16b',
'15.1(2)T',
'15.1(2)T0a',
'15.1(2)T1',
'15.1(2)T2',
'15.1(2)T2a',
'15.1(2)T3',
'15.1(2)T4',
'15.1(2)T5',
'15.1(3)MRA',
'15.1(3)MRA1',
'15.1(3)MRA2',
'15.1(3)MRA3',
'15.1(3)MRA4',
'15.1(3)S',
'15.1(3)S0a',
'15.1(3)S1',
'15.1(3)S2',
'15.1(3)S3',
'15.1(3)S4',
'15.1(3)S5',
'15.1(3)S5a',
'15.1(3)S6',
'15.1(3)S7',
'15.1(3)SVR10',
'15.1(3)SVS',
'15.1(3)SVT1',
'15.1(3)SVT3',
'15.1(3)SVT4',
'15.1(3)SVU1',
'15.1(3)SVU2',
'15.1(3)SVU10',
'15.1(3)SVU11',
'15.1(3)SVU20',
'15.1(3)SVU21',
'15.1(3)SVV1',
'15.1(3)SVV2',
'15.1(3)SVV3',
'15.1(3)SVV4',
'15.1(3)SVW',
'15.1(3)SVW1',
'15.1(3)SVX',
'15.1(3)SVX1',
'15.1(3)T',
'15.1(3)T1',
'15.1(3)T2',
'15.1(3)T3',
'15.1(3)T4',
'15.1(4)GC',
'15.1(4)GC1',
'15.1(4)GC2',
'15.1(4)M',
'15.1(4)M0a',
'15.1(4)M0b',
'15.1(4)M1',
'15.1(4)M2',
'15.1(4)M3',
'15.1(4)M3a',
'15.1(4)M4',
'15.1(4)M5',
'15.1(4)M6',
'15.1(4)M7',
'15.1(4)M8',
'15.1(4)M9',
'15.1(4)M10',
'15.1(4)M12a',
'15.1(4)XB4',
'15.1(4)XB5',
'15.1(4)XB5a',
'15.1(4)XB6',
'15.1(4)XB7',
'15.1(4)XB8',
'15.1(4)XB8a',
'15.2(1)E',
'15.2(1)E1',
'15.2(1)E2',
'15.2(1)E3',
'15.2(1)EY',
'15.2(1)GC',
'15.2(1)GC1',
'15.2(1)GC2',
'15.2(1)S',
'15.2(1)S1',
'15.2(1)S2',
'15.2(1)SY',
'15.2(1)SY0a',
'15.2(1)SY1',
'15.2(1)SY1a',
'15.2(1)SY2',
'15.2(1)SY3',
'15.2(1)SY4',
'15.2(1)SY5',
'15.2(1)SY6',
'15.2(1)SY7',
'15.2(1)SY8',
'15.2(2)E',
'15.2(2)E1',
'15.2(2)E2',
'15.2(2)E3',
'15.2(2)E4',
'15.2(2)E5',
'15.2(2)E5a',
'15.2(2)E5b',
'15.2(2)E6',
'15.2(2)E7',
'15.2(2)E7b',
'15.2(2)E8',
'15.2(2)E9',
'15.2(2)E9a',
'15.2(2)E10',
'15.2(2)E10a',
'15.2(2)E10b',
'15.2(2)E10c',
'15.2(2)E10d',
'15.2(2)EA',
'15.2(2)EA2',
'15.2(2)EA3',
'15.2(2)EB',
'15.2(2)EB1',
'15.2(2)EB2',
'15.2(2)GC',
'15.2(2)S',
'15.2(2)S1',
'15.2(2)S2',
'15.2(2)SC1',
'15.2(2)SC3',
'15.2(2)SC4',
'15.2(2)SY',
'15.2(2)SY1',
'15.2(2)SY2',
'15.2(2)SY3',
'15.2(2a)E1',
'15.2(2a)E2',
'15.2(2b)E',
'15.2(3)E',
'15.2(3)E1',
'15.2(3)E2',
'15.2(3)E3',
'15.2(3)E4',
'15.2(3)E5',
'15.2(3)EA',
'15.2(3)GC',
'15.2(3)GC1',
'15.2(3a)E',
'15.2(3m)E2',
'15.2(3m)E7',
'15.2(3m)E8',
'15.2(4)E',
'15.2(4)E1',
'15.2(4)E2',
'15.2(4)E3',
'15.2(4)E4',
'15.2(4)E5',
'15.2(4)E5a',
'15.2(4)E6',
'15.2(4)E7',
'15.2(4)E8',
'15.2(4)E9',
'15.2(4)E10',
'15.2(4)E10a',
'15.2(4)E10b',
'15.2(4)E10c',
'15.2(4)E10d',
'15.2(4)E10e',
'15.2(4)EA',
'15.2(4)EA1',
'15.2(4)EA4',
'15.2(4)EA5',
'15.2(4)EA6',
'15.2(4)EA7',
'15.2(4)EA8',
'15.2(4)EA9',
'15.2(4)EA9a',
'15.2(4)EC1',
'15.2(4)EC2',
'15.2(4)GC',
'15.2(4)GC1',
'15.2(4)GC2',
'15.2(4)GC3',
'15.2(4)M',
'15.2(4)M1',
'15.2(4)M2',
'15.2(4)M3',
'15.2(4)M4',
'15.2(4)M5',
'15.2(4)M6',
'15.2(4)M6a',
'15.2(4)M6b',
'15.2(4)M7',
'15.2(4)M8',
'15.2(4)M9',
'15.2(4)M10',
'15.2(4)M11',
'15.2(4)S',
'15.2(4)S1',
'15.2(4)S2',
'15.2(4)S3',
'15.2(4)S3a',
'15.2(4)S4',
'15.2(4)S4a',
'15.2(4)S5',
'15.2(4)S6',
'15.2(4)S7',
'15.2(4)S8',
'15.2(4m)E1',
'15.2(4m)E2',
'15.2(4m)E3',
'15.2(4n)E2',
'15.2(4o)E2',
'15.2(4o)E3',
'15.2(4p)E1',
'15.2(4q)E1',
'15.2(4s)E1',
'15.2(5)E',
'15.2(5)E1',
'15.2(5)E2',
'15.2(5)E2b',
'15.2(5)E2c',
'15.2(5)EA',
'15.2(5a)E1',
'15.2(5b)E',
'15.2(6)E',
'15.2(6)E0a',
'15.2(6)E0c',
'15.2(6)E1',
'15.2(6)E1a',
'15.2(6)E1s',
'15.2(6)E2',
'15.2(6)E2a',
'15.2(6)E3',
'15.2(6)EB',
'15.2(7)E',
'15.2(7)E0a',
'15.2(7)E0b',
'15.2(7)E0s',
'15.2(7)E1',
'15.2(7)E1a',
'15.2(7)E2',
'15.2(7)E2b',
'15.2(7)E3',
'15.2(7)E4',
'15.2(7)E5',
'15.2(7)E6',
'15.2(7)E7',
'15.2(7)E8',
'15.2(7)E9',
'15.2(7)E10',
'15.2(7a)E0b',
'15.2(7b)E0b',
'15.2(8)E',
'15.2(8)E1',
'15.2(8)E2',
'15.2(8)E3',
'15.2(8)E4',
'15.2(8)E5',
'15.3(0)SY',
'15.3(1)S',
'15.3(1)S1',
'15.3(1)S2',
'15.3(1)SY',
'15.3(1)SY1',
'15.3(1)SY2',
'15.3(1)T',
'15.3(1)T1',
'15.3(1)T2',
'15.3(1)T3',
'15.3(1)T4',
'15.3(2)S',
'15.3(2)S1',
'15.3(2)S2',
'15.3(2)T',
'15.3(2)T1',
'15.3(2)T2',
'15.3(2)T3',
'15.3(2)T4',
'15.3(3)JPI11',
'15.3(3)M',
'15.3(3)M1',
'15.3(3)M2',
'15.3(3)M3',
'15.3(3)M4',
'15.3(3)M5',
'15.3(3)M6',
'15.3(3)M7',
'15.3(3)M8',
'15.3(3)M8a',
'15.3(3)M9',
'15.3(3)M10',
'15.3(3)S',
'15.3(3)S1',
'15.3(3)S2',
'15.3(3)S2a',
'15.3(3)S3',
'15.3(3)S4',
'15.3(3)S5',
'15.3(3)S6',
'15.3(3)S6a',
'15.3(3)S7',
'15.3(3)S8',
'15.3(3)S8a',
'15.3(3)S9',
'15.3(3)S10',
'15.3(3)XB12',
'15.4(1)CG',
'15.4(1)CG1',
'15.4(1)S',
'15.4(1)S1',
'15.4(1)S2',
'15.4(1)S3',
'15.4(1)S4',
'15.4(1)SY',
'15.4(1)SY1',
'15.4(1)SY2',
'15.4(1)SY3',
'15.4(1)SY4',
'15.4(1)T',
'15.4(1)T1',
'15.4(1)T2',
'15.4(1)T3',
'15.4(1)T4',
'15.4(2)CG',
'15.4(2)S',
'15.4(2)S1',
'15.4(2)S2',
'15.4(2)S3',
'15.4(2)S4',
'15.4(2)SN',
'15.4(2)SN1',
'15.4(2)T',
'15.4(2)T1',
'15.4(2)T2',
'15.4(2)T3',
'15.4(2)T4',
'15.4(3)M',
'15.4(3)M1',
'15.4(3)M2',
'15.4(3)M3',
'15.4(3)M4',
'15.4(3)M5',
'15.4(3)M6',
'15.4(3)M6a',
'15.4(3)M7',
'15.4(3)M7a',
'15.4(3)M8',
'15.4(3)M9',
'15.4(3)M10',
'15.4(3)S',
'15.4(3)S0d',
'15.4(3)S0e',
'15.4(3)S0f',
'15.4(3)S1',
'15.4(3)S2',
'15.4(3)S3',
'15.4(3)S4',
'15.4(3)S5',
'15.4(3)S6',
'15.4(3)S6a',
'15.4(3)S7',
'15.4(3)S8',
'15.4(3)S9',
'15.4(3)S10',
'15.4(3)SN1',
'15.4(3)SN1a',
'15.5(1)S',
'15.5(1)S1',
'15.5(1)S2',
'15.5(1)S3',
'15.5(1)S4',
'15.5(1)SN',
'15.5(1)SN1',
'15.5(1)SY',
'15.5(1)SY1',
'15.5(1)SY2',
'15.5(1)SY3',
'15.5(1)SY4',
'15.5(1)SY5',
'15.5(1)SY6',
'15.5(1)SY7',
'15.5(1)SY8',
'15.5(1)SY9',
'15.5(1)SY10',
'15.5(1)SY11',
'15.5(1)SY12',
'15.5(1)T',
'15.5(1)T1',
'15.5(1)T2',
'15.5(1)T3',
'15.5(1)T4',
'15.5(2)S',
'15.5(2)S1',
'15.5(2)S2',
'15.5(2)S3',
'15.5(2)S4',
'15.5(2)SN',
'15.5(2)T',
'15.5(2)T1',
'15.5(2)T2',
'15.5(2)T3',
'15.5(2)T4',
'15.5(2)XB',
'15.5(3)M',
'15.5(3)M0a',
'15.5(3)M1',
'15.5(3)M2',
'15.5(3)M2a',
'15.5(3)M3',
'15.5(3)M4',
'15.5(3)M4a',
'15.5(3)M4b',
'15.5(3)M4c',
'15.5(3)M5',
'15.5(3)M6',
'15.5(3)M6a',
'15.5(3)M7',
'15.5(3)M8',
'15.5(3)M9',
'15.5(3)M10',
'15.5(3)M11',
'15.5(3)M11a',
'15.5(3)M11b',
'15.5(3)S',
'15.5(3)S0a',
'15.5(3)S1',
'15.5(3)S1a',
'15.5(3)S2',
'15.5(3)S3',
'15.5(3)S4',
'15.5(3)S5',
'15.5(3)S6',
'15.5(3)S6a',
'15.5(3)S6b',
'15.5(3)S7',
'15.5(3)S8',
'15.5(3)S9',
'15.5(3)S9a',
'15.5(3)S10',
'15.5(3)S10a',
'15.5(3)S10b',
'15.5(3)S10c',
'15.5(3)SN',
'15.5(3)SN0a',
'15.6(1)S',
'15.6(1)S1',
'15.6(1)S2',
'15.6(1)S3',
'15.6(1)S4',
'15.6(1)SN',
'15.6(1)SN1',
'15.6(1)SN2',
'15.6(1)SN3',
'15.6(1)T',
'15.6(1)T0a',
'15.6(1)T1',
'15.6(1)T2',
'15.6(1)T3',
'15.6(2)S',
'15.6(2)S1',
'15.6(2)S2',
'15.6(2)S3',
'15.6(2)S4',
'15.6(2)SN',
'15.6(2)SP',
'15.6(2)SP1',
'15.6(2)SP2',
'15.6(2)SP3',
'15.6(2)SP4',
'15.6(2)SP5',
'15.6(2)SP6',
'15.6(2)SP7',
'15.6(2)SP8',
'15.6(2)SP8a',
'15.6(2)SP9',
'15.6(2)SP10',
'15.6(2)T',
'15.6(2)T0a',
'15.6(2)T1',
'15.6(2)T2',
'15.6(2)T3',
'15.6(3)M',
'15.6(3)M0a',
'15.6(3)M1',
'15.6(3)M1a',
'15.6(3)M1b',
'15.6(3)M2',
'15.6(3)M2a',
'15.6(3)M3',
'15.6(3)M3a',
'15.6(3)M4',
'15.6(3)M5',
'15.6(3)M6',
'15.6(3)M6a',
'15.6(3)M6b',
'15.6(3)M7',
'15.6(3)M8',
'15.6(3)M9',
'15.6(3)SN',
'15.6(4)SN',
'15.6(5)SN',
'15.6(7)SN',
'15.6(7)SN1',
'15.6(7)SN2',
'15.7(3)M',
'15.7(3)M0a',
'15.7(3)M1',
'15.7(3)M2',
'15.7(3)M3',
'15.7(3)M4',
'15.7(3)M4a',
'15.7(3)M4b',
'15.7(3)M5',
'15.7(3)M6',
'15.7(3)M7',
'15.7(3)M8',
'15.7(3)M9',
'15.7(3)M10',
'15.7(3)M10a',
'15.8(3)M',
'15.8(3)M0a',
'15.8(3)M0b',
'15.8(3)M1',
'15.8(3)M1a',
'15.8(3)M2',
'15.8(3)M2a',
'15.8(3)M3',
'15.8(3)M3a',
'15.8(3)M3b',
'15.8(3)M4',
'15.8(3)M5',
'15.8(3)M6',
'15.8(3)M7',
'15.8(3)M8',
'15.8(3)M9',
'15.8(3)M9a',
'15.8(3)M10',
'15.9(3)M',
'15.9(3)M0a',
'15.9(3)M1',
'15.9(3)M2',
'15.9(3)M2a',
'15.9(3)M3',
'15.9(3)M3a',
'15.9(3)M3b',
'15.9(3)M4',
'15.9(3)M4a',
'15.9(3)M5',
'15.9(3)M6',
'15.9(3)M6a',
'15.9(3)M6b',
'15.9(3)M7',
'15.9(3)M7a',
'15.9(3)M8',
'15.9(3)M8a',
'15.9(3)M8b'
);
var workarounds = make_list(
CISCO_WORKAROUNDS['show_udp_ike'],
CISCO_WORKAROUNDS['show_ip_sock_ike']
);
var reporting = make_array(
'port' , product_info['port'],
'severity', SECURITY_HOLE,
'version' , product_info['version'],
'bug_id' , 'CSCwf11183, CSCwh66334',
'cmds' , make_list('show ip sockets', 'show udp')
);
cisco::check_and_report(
product_info:product_info,
workarounds:workarounds,
require_all_workarounds:TRUE,
reporting:reporting,
vuln_versions:version_list
);
8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
9.1%