Lucene search

K
nessusThis script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.CISCO-SA-SD-WAN-FILE-ACCESS-VW36D28P.NASL
HistoryApr 13, 2022 - 12:00 a.m.

Cisco SD-WAN Solution Improper Access Control (cisco-sa-sd-wan-file-access-VW36d28P)

2022-04-1300:00:00
This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
12
cisco sd-wan
vulnerability
improper access control
local attacker
escalated privileges
file modification

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

According to its self-reported version, Cisco SD-WAN Viptela Software is affected by a vulnerability.

  • A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper access control on files within the affected system. A local attacker could exploit this vulnerability by modifying certain files on the vulnerable device. If successful, the attacker could gain escalated privileges and take actions on the system with the privileges of the root user. (CVE-2022-20716)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

#TRUSTED 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
#TRUST-RSA-SHA256 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
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable, Inc.
##

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(159718);
  script_version("1.10");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/05");

  script_cve_id("CVE-2022-20716");
  script_xref(name:"CISCO-BUG-ID", value:"CSCvy11382");
  script_xref(name:"CISCO-SA", value:"cisco-sa-sd-wan-file-access-VW36d28P");
  script_xref(name:"IAVA", value:"2022-A-0158-S");

  script_name(english:"Cisco SD-WAN Solution Improper Access Control (cisco-sa-sd-wan-file-access-VW36d28P)");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version, Cisco SD-WAN Viptela Software is affected by a vulnerability.

  - A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain
    escalated privileges. This vulnerability is due to improper access control on files within the affected
    system. A local attacker could exploit this vulnerability by modifying certain files on the vulnerable
    device. If successful, the attacker could gain escalated privileges and take actions on the system with
    the privileges of the root user. (CVE-2022-20716)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-file-access-VW36d28P
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f70bc151");
  script_set_attribute(attribute:"see_also", value:"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy11382");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvy11382");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-20716");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(284);

  script_set_attribute(attribute:"vuln_publication_date", value:"2022/04/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2022/04/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2022/04/13");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cisco:sd-wan_vmanage");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:sd-wan_firmware");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/a:cisco:sd-wan_vbond_orchestrator");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/a:cisco:sd-wan_vedge");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/a:cisco:sd-wan_vsmart_controller");
  script_set_attribute(attribute:"cpe", value:"x-cpe:/a:cisco:vedge_cloud_router");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CISCO");

  script_copyright(english:"This script is Copyright (C) 2022-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("cisco_vedge_detect.nbin");
  script_require_keys("Cisco/Viptela/Version", "Cisco/Viptela/Model");

  exit(0);
}

include('ccf.inc');

var product_info = cisco::get_product_info(name:'Cisco Viptela');

if (tolower(product_info['model']) !~ "vbond|vedge|vedge cloud|vmanage|vsmart")
  audit(AUDIT_HOST_NOT, 'an affected model');

var vuln_ranges = [
  { 'min_ver' : '18.4', 'fix_ver' : '20.3.6' },
  { 'min_ver' : '20.4', 'fix_ver' : '20.6.1' },
  { 'min_ver' : '20.7', 'fix_ver' : '20.7.1' }
];

 
var reporting = make_array(
  'port'     , 0,
  'severity' , SECURITY_HOLE,
  'bug_id'   , 'CSCvy11382',
  'version'  , product_info['version'],
  'disable_caveat', TRUE
);

cisco::check_and_report(
  product_info:product_info,
  vuln_ranges:vuln_ranges,
  reporting:reporting
);

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Related for CISCO-SA-SD-WAN-FILE-ACCESS-VW36D28P.NASL