Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO-SA-IOSXE-PRIV-ESC-SEAX6NLX.NASL
HistoryApr 15, 2024 - 12:00 a.m.

Cisco IOS XE Software Privilege Escalation (cisco-sa-iosxe-priv-esc-seAx6NLX)

2024-04-1500:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
9
cisco
ios xe
privilege escalation
vulnerability
netconf
remote attacker
root access
cve-2024-20278
cisco bids
security advisory
scanner

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

According to its self-reported version, Cisco IOS-XE Software is affected by a vulnerability.

  • A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root. (CVE-2024-20278)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

#TRUSTED 8e380f4f7a70d38255b5b676bb24dbc414ddf91b6430457b6324fbe3975ce531d24cd2e10d50012f8e5e578179b496bfea7ac7471b9e8849267a4495c66cc7f3b808f768833fa820304f05f6417df412df4a186526dbf56fb78b7a1aef917cbb62a132ad9180bc13198c8a232afaf35fac51f8eb6d263542bf7b290f7a00ac7aeb46386e8616d9513ff0857867958e103d4e44d35d5499ab5e79166b6188f804ef795a1a86c1d63d326471fe48b9194f23f1bc230d9d7d65ba6c140334d5c1187d050bce2a6f7ecd4c12cc56f86490b7aba4e6bcf17f61dab907d0e3dde4c28d09f99e1085118449a4d9a86d75bbedfc9162653b74e341aabe4e03cb486d2563d9596834a16ce02b8f7f27779f0fa8b1caa964e11666c45ff7e5cfe5cf30382fa4ecc25ad5f8708e2bf15ea47b5b37bd98ebee57a1ea667e1bd6194bc6cfae26287ae351483c1a716c0f4583629654ad2993be16b0302bf0e5442acf93a3a1bff63fcd796617731f14cb0068c89f3b4dc83ce564489b137342a84c2122b30f99a1de80e7da849b099de61f2187e047dd9b3de815301545ba8a728813a7b11a58c35d7edb18de02551f22c1b15e2c0503927523ebba66da7776fba13b186676f949d2176f76ea1c0aab0e4bc96662a8c9751492387e5d5051e9c9995126ecb25b7afea39c71514e1566abc2d70e9d0313444fc6303fdeeeda0dd471f207d4f26a
#TRUST-RSA-SHA256 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
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(193332);
  script_version("1.0");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/04/15");

  script_cve_id("CVE-2024-20278");
  script_xref(name:"CISCO-BUG-ID", value:"CSCwf91143");
  script_xref(name:"CISCO-SA", value:"cisco-sa-iosxe-priv-esc-seAx6NLX");
  script_xref(name:"IAVA", value:"2024-A-0188");

  script_name(english:"Cisco IOS XE Software Privilege Escalation (cisco-sa-iosxe-priv-esc-seAx6NLX)");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco IOS-XE Software is affected by a vulnerability.

  - A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote
    attacker to elevate privileges to root on an affected device. This vulnerability is due to improper
    validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input
    over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges
    from Administrator to root. (CVE-2024-20278)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.");
  # https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2cbda070");
  # https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75056
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a1da659d");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf91143");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwf91143");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-20278");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(184);

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/03/27");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/03/27");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/04/15");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios_xe");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_ios_xe_version.nasl");
  script_require_keys("Host/Cisco/IOS-XE/Version");

  exit(0);
}

include('cisco_workarounds.inc');
include('ccf.inc');

var product_info = cisco::get_product_info(name:'Cisco IOS XE Software');

var version_list=make_list(
  '17.6.1',
  '17.6.1a',
  '17.6.1w',
  '17.6.1x',
  '17.6.1y',
  '17.6.1z',
  '17.6.1z1',
  '17.6.2',
  '17.6.3',
  '17.6.3a',
  '17.6.4',
  '17.6.5',
  '17.6.5a',
  '17.6.6',
  '17.6.6a',
  '17.7.1',
  '17.7.1a',
  '17.7.1b',
  '17.7.2',
  '17.8.1',
  '17.8.1a',
  '17.9.1',
  '17.9.1a',
  '17.9.1w',
  '17.9.1x',
  '17.9.1x1',
  '17.9.1y',
  '17.9.1y1',
  '17.9.2',
  '17.9.2a',
  '17.9.3',
  '17.9.3a',
  '17.9.4',
  '17.9.4a',
  '17.10.1',
  '17.10.1a',
  '17.10.1b',
  '17.11.1',
  '17.11.1a',
  '17.11.99SW',
  '17.12.1',
  '17.12.1a',
  '17.12.1w'
);

var workarounds = make_list(CISCO_WORKAROUNDS['generic_workaround']);
var workaround_params = WORKAROUND_CONFIG['netconf'];

var reporting = make_array(
  'port'    , product_info['port'],
  'severity', SECURITY_HOLE,
  'version' , product_info['version'],
  'bug_id'  , 'CSCwf91143',
  'fix'     , 'See vendor advisory'
);

cisco::check_and_report(
  product_info:product_info,
  workarounds:workarounds,
  workaround_params:workaround_params,
  reporting:reporting,
  vuln_versions:version_list
);
VendorProductVersionCPE
ciscoios_xecpe:/o:cisco:ios_xe

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

7.1 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.0%

Related for CISCO-SA-IOSXE-PRIV-ESC-SEAX6NLX.NASL