CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
9.0%
According to its self-reported version, Cisco IOS-XE Software is affected by a vulnerability.
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
#TRUSTED 74d1330caa1e67112dee23d7df4315eb90470330e34000eec46c5c53b765b7cab6f2d21afd87c799caa1249de8e16d6dfa255ba2ae5fb0a390705439af7d338a7e3d914a09ec5da9a7721e80db921204fbfce249d5d02ecd8bd1a0ebc5151b021d7ddad8509bc39bd80526dd8e337896e78bef1ed37436fcae64dc25ba78ab5201d80acb4329ae55be43e15fccd9c7c5086ebbd3a7baba6837298b9dca7acf1a394dbcf95a6b60f199f059dab68f2c8bdaea38d691de605503251f41ea50b4dfdfa70ea8a53ffbdcefc41eaf988ade5c1a1f66b173e1bd2f2d0b61146d861626e75dbad604d10ee55685b6e8e1b24c64ee75a78760ebf88874217f1bae18a018c797fde5ccfa142c67e19c9251157d48c96d4ce841c76d83eaaa056aaca4ea653d01ac51080c40b5c83ac73028742d4ba2ad7e904cdc3e6ae0767017f64522f67b08c7f8456c2f9597924098bf6180d0fec949f7bbe822b7e8b9e4840395c8e3fa08496569628c10b3c35e0766fb9446c61be8558bbb979b9643305e204b2ac3726853aca7b8785d497dbb50a679258c74e63af48185fc1e07ef826be923b6ff566e3f5b07f5699ba3e4135caeed996f5f82b92c1fe1a263c6d9899062913f666f85bf145c0af0a4dd1afd23fe36d697f1e29f7afe2bf3e3ec8b692f197542f343e22d5de9c0900bab88161007dcc94d27d74efa13bd346fc775c15b0cf8ab16
#TRUST-RSA-SHA256 ac803e5c8e500c4396cb514f5a73f200054654216573fedf3b099a60b8db3cbfe3e7df2f2d09f4110d354b90ba49af3fc0d65b3f0515f4c827407eb5c6f0604d7aeb09794f619ba19cab7f8a5cd57458281803ba797683ae2aee39da5f1e8b4840e8f4abcef0be610527a5d2814a574b3cb75363a910941fc66494f965758522192a284f898d753d793c077998b6ba8dcd1cd7333a5ecff0e0009a96b7b42901fdbd999cc90eceecdd250190cab5d0bc609701de832d1f9399fdd42ef885fdaddc1270e05b6ec8f84a8856b6a4be9c0aea3306554f4743a856a104ebcf6996fcfc6c395263302d74f9f1942c1395cdea481a2d8f143bfd1011747ad7041689c74132263dfe0fba3a16042fd9a3f599e4c4ed11925434391235866957d7966ac57b3e2abb54dffdb5d9dcd097745342311134106cd0fb5a41ed2c9c05a2c39ad7035c56260aefc52501f8853c7b38a5de84fecbe2aa0f22fba5407d8063220e2fefca1904bd0fea5356ae7e07fc1e1640f4aeda35380a29ccf4475b0967957f427bc0cb2b7ec1909b89ddaa5cd04ca1e44384ba33d74cf7cf0a9f198d15003574e60d32b5f3a45b90683f42f6e1f56a3fda3fb6809f0010f1440c05ccab18e7190848f2e380894e73b2ec16b957834e59ff7cf668702cbb104577845428976817f71e597d68e02a84e55d93448f91c26a017e1b7f6ed2193367e45dd994a41e0e
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(193268);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/09/27");
script_cve_id("CVE-2024-20311");
script_xref(name:"CISCO-BUG-ID", value:"CSCwf36266");
script_xref(name:"CISCO-SA", value:"cisco-sa-lisp-3gYXs3qP");
script_xref(name:"IAVA", value:"2024-A-0188-S");
script_name(english:"Cisco IOS XE Software Locator ID Separation Protocol DoS (cisco-sa-lisp-3gYXs3qP)");
script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco IOS-XE Software is affected by a vulnerability.
- A vulnerability in the Locator ID Separation Protocol (LISP) feature of Cisco IOS Software and Cisco IOS
XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. This
vulnerability is due to the incorrect handling of LISP packets. An attacker could exploit this
vulnerability by sending a crafted LISP packet to an affected device. A successful exploit could allow the
attacker to cause the device to reload, resulting in a denial of service (DoS) condition. Note: This
vulnerability could be exploited over either IPv4 or IPv6 transport. (CVE-2024-20311)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.");
# https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lisp-3gYXs3qP
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a1b2c681");
# https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75056
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a1da659d");
script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf36266");
script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwf36266");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-20311");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(674);
script_set_attribute(attribute:"vuln_publication_date", value:"2024/03/27");
script_set_attribute(attribute:"patch_publication_date", value:"2024/03/27");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/04/12");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios_xe");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CISCO");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("cisco_ios_xe_version.nasl");
script_require_keys("Host/Cisco/IOS-XE/Version");
exit(0);
}
include('cisco_workarounds.inc');
include('ccf.inc');
var product_info = cisco::get_product_info(name:'Cisco IOS XE Software');
var version_list=make_list(
'3.7.0S',
'3.7.0bS',
'3.7.0xaS',
'3.7.0xbS',
'3.7.1S',
'3.7.1aS',
'3.7.2S',
'3.7.2tS',
'3.7.3S',
'3.7.4S',
'3.7.4aS',
'3.7.5S',
'3.7.6S',
'3.7.7S',
'3.7.8S',
'3.8.0S',
'3.8.1S',
'3.8.2S',
'3.9.0S',
'3.9.0aS',
'3.9.0xaS',
'3.9.1E',
'3.9.1S',
'3.9.1aS',
'3.9.2E',
'3.9.2S',
'3.9.2bE',
'3.10.0E',
'3.10.0S',
'3.10.0cE',
'3.10.1E',
'3.10.1S',
'3.10.1aE',
'3.10.1sE',
'3.10.1xbS',
'3.10.1xcS',
'3.10.2E',
'3.10.2S',
'3.10.2aS',
'3.10.2tS',
'3.10.3E',
'3.10.3S',
'3.10.4S',
'3.10.5S',
'3.10.6S',
'3.10.7S',
'3.10.8S',
'3.10.8aS',
'3.10.9S',
'3.10.10S',
'3.11.0E',
'3.11.0S',
'3.11.1E',
'3.11.1S',
'3.11.1aE',
'3.11.2E',
'3.11.2S',
'3.11.2aE',
'3.11.3E',
'3.11.3S',
'3.11.3aE',
'3.11.4E',
'3.11.4S',
'3.11.5E',
'3.11.6E',
'3.11.7E',
'3.11.8E',
'3.12.0S',
'3.12.0aS',
'3.12.1S',
'3.12.2S',
'3.12.3S',
'3.12.4S',
'3.13.0S',
'3.13.0aS',
'3.13.1S',
'3.13.2S',
'3.13.2aS',
'3.13.3S',
'3.13.4S',
'3.13.5S',
'3.13.5aS',
'3.13.6S',
'3.13.6aS',
'3.13.6bS',
'3.13.7S',
'3.13.7aS',
'3.13.8S',
'3.13.9S',
'3.13.10S',
'3.14.0S',
'3.14.1S',
'3.14.2S',
'3.14.3S',
'3.14.4S',
'3.15.0S',
'3.15.1S',
'3.15.1cS',
'3.15.2S',
'3.15.3S',
'3.15.4S',
'3.16.0S',
'3.16.0aS',
'3.16.0bS',
'3.16.0cS',
'3.16.1S',
'3.16.1aS',
'3.16.2S',
'3.16.2aS',
'3.16.2bS',
'3.16.3S',
'3.16.3aS',
'3.16.4S',
'3.16.4aS',
'3.16.4bS',
'3.16.4cS',
'3.16.4dS',
'3.16.4eS',
'3.16.4gS',
'3.16.5S',
'3.16.5aS',
'3.16.5bS',
'3.16.6S',
'3.16.6bS',
'3.16.7S',
'3.16.7aS',
'3.16.7bS',
'3.16.8S',
'3.16.9S',
'3.16.10S',
'3.16.10aS',
'3.16.10bS',
'3.16.10cS',
'3.17.0S',
'3.17.1S',
'3.17.1aS',
'3.17.2S',
'3.17.3S',
'3.17.4S',
'3.18.0S',
'3.18.0SP',
'3.18.0aS',
'3.18.1S',
'3.18.1SP',
'3.18.1aSP',
'3.18.1bSP',
'3.18.1cSP',
'3.18.1gSP',
'3.18.1hSP',
'3.18.1iSP',
'3.18.2S',
'3.18.2SP',
'3.18.2aSP',
'3.18.3S',
'3.18.3SP',
'3.18.3aSP',
'3.18.3bSP',
'3.18.4S',
'3.18.4SP',
'3.18.5SP',
'3.18.6SP',
'3.18.7SP',
'3.18.8aSP',
'3.18.9SP',
'16.1.1',
'16.1.2',
'16.1.3',
'16.2.1',
'16.2.2',
'16.3.1',
'16.3.1a',
'16.3.2',
'16.3.3',
'16.3.4',
'16.3.5',
'16.3.5b',
'16.3.6',
'16.3.7',
'16.3.8',
'16.3.9',
'16.3.10',
'16.3.11',
'16.4.1',
'16.4.2',
'16.4.3',
'16.5.1',
'16.5.1a',
'16.5.1b',
'16.5.2',
'16.5.3',
'16.6.1',
'16.6.2',
'16.6.3',
'16.6.4',
'16.6.4a',
'16.6.4s',
'16.6.5',
'16.6.5a',
'16.6.5b',
'16.6.6',
'16.6.7',
'16.6.7a',
'16.6.8',
'16.6.9',
'16.6.10',
'16.7.1',
'16.7.1a',
'16.7.1b',
'16.7.2',
'16.7.3',
'16.7.4',
'16.8.1',
'16.8.1a',
'16.8.1b',
'16.8.1c',
'16.8.1d',
'16.8.1e',
'16.8.1s',
'16.8.2',
'16.8.3',
'16.9.1',
'16.9.1a',
'16.9.1b',
'16.9.1c',
'16.9.1d',
'16.9.1s',
'16.9.2',
'16.9.2a',
'16.9.2s',
'16.9.3',
'16.9.3a',
'16.9.3h',
'16.9.3s',
'16.9.4',
'16.9.4c',
'16.9.5',
'16.9.5f',
'16.9.6',
'16.9.7',
'16.9.8',
'16.9.8a',
'16.9.8b',
'16.9.8c',
'16.10.1',
'16.10.1a',
'16.10.1b',
'16.10.1c',
'16.10.1d',
'16.10.1e',
'16.10.1f',
'16.10.1g',
'16.10.1s',
'16.10.2',
'16.10.3',
'16.11.1',
'16.11.1a',
'16.11.1b',
'16.11.1c',
'16.11.1s',
'16.11.2',
'16.12.1',
'16.12.1a',
'16.12.1c',
'16.12.1s',
'16.12.1t',
'16.12.1w',
'16.12.1x',
'16.12.1y',
'16.12.1z',
'16.12.1z1',
'16.12.1z2',
'16.12.2',
'16.12.2a',
'16.12.2s',
'16.12.2t',
'16.12.3',
'16.12.3a',
'16.12.3s',
'16.12.4',
'16.12.4a',
'16.12.5',
'16.12.5a',
'16.12.5b',
'16.12.6',
'16.12.6a',
'16.12.7',
'16.12.8',
'16.12.9',
'17.1.1',
'17.1.1a',
'17.1.1s',
'17.1.1t',
'17.1.2',
'17.1.3',
'17.2.1',
'17.2.1a',
'17.2.1r',
'17.2.1v',
'17.2.2',
'17.2.3',
'17.3.1',
'17.3.1a',
'17.3.1w',
'17.3.1x',
'17.3.1z',
'17.3.2',
'17.3.2a',
'17.3.3',
'17.3.3a',
'17.3.4',
'17.3.4a',
'17.3.4b',
'17.3.4c',
'17.3.5',
'17.3.5a',
'17.3.5b',
'17.3.6',
'17.3.7',
'17.4.1',
'17.4.1a',
'17.4.1b',
'17.4.1c',
'17.4.2',
'17.4.2a',
'17.5.1',
'17.5.1a',
'17.6.1',
'17.6.1a',
'17.6.1w',
'17.6.1x',
'17.6.1y',
'17.6.1z',
'17.6.1z1',
'17.6.2',
'17.6.3',
'17.6.3a',
'17.6.4',
'17.6.5',
'17.6.5a',
'17.7.1',
'17.7.1a',
'17.7.1b',
'17.7.2',
'17.8.1',
'17.8.1a',
'17.9.1',
'17.9.1a',
'17.9.1w',
'17.9.1x',
'17.9.1x1',
'17.9.1y',
'17.9.2',
'17.9.2a',
'17.9.3',
'17.9.3a',
'17.10.1',
'17.10.1a',
'17.10.1b',
'17.11.1',
'17.11.1a',
'17.11.99SW'
);
var workarounds = make_list(CISCO_WORKAROUNDS['generic_workaround']);
var workaround_params = WORKAROUND_CONFIG['router_lisp'];
var reporting = make_array(
'port' , product_info['port'],
'severity', SECURITY_HOLE,
'version' , product_info['version'],
'bug_id' , 'CSCwf36266',
'cmds' , ['show running-config'],
'fix' , 'See vendor advisory'
);
cisco::check_and_report(
product_info:product_info,
workarounds:workarounds,
workaround_params:workaround_params,
reporting:reporting,
vuln_versions:version_list
);
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
9.0%