Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_CISCO_CVE-2015-4324.NASL
HistoryJul 25, 2023 - 12:00 a.m.

Cisco NX-OS Internet Group Management Protocol Denial of Service (CVE-2015-4324)

2023-07-2500:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
6
cisco nx-os
buffer overflow
cve-2015-4324
nexus 1000v
vmware vsphere
nexus 3000
nexus 4000
nexus 7000
nexus 9000
denial of service
igmp process restart
remote attackers
igmpv3 packet
tenable.ot
memory allocation

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

7.2 High

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

69.3%

Buffer overflow in Cisco NX-OS on Nexus 1000V devices for VMware vSphere 7.3(0)ZN(0.81), Nexus 3000 devices 7.3(0)ZN(0.81), Nexus 4000 devices 4.1(2)E1(1c), Nexus 7000 devices 7.2(0)N1(0.1), and Nexus 9000 devices 7.3(0)ZN(0.81) allows remote attackers to cause a denial of service (IGMP process restart) via a malformed IGMPv3 packet that is mishandled during memory allocation, aka Bug IDs CSCuv69713, CSCuv69717, CSCuv69723, CSCuv69732, and CSCuv48908.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(501237);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/12/25");

  script_cve_id("CVE-2015-4324");

  script_name(english:"Cisco NX-OS Internet Group Management Protocol Denial of Service (CVE-2015-4324)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"Buffer overflow in Cisco NX-OS on Nexus 1000V devices for VMware
vSphere 7.3(0)ZN(0.81), Nexus 3000 devices 7.3(0)ZN(0.81), Nexus 4000
devices 4.1(2)E1(1c), Nexus 7000 devices 7.2(0)N1(0.1), and Nexus 9000
devices 7.3(0)ZN(0.81) allows remote attackers to cause a denial of
service (IGMP process restart) via a malformed IGMPv3 packet that is
mishandled during memory allocation, aka Bug IDs CSCuv69713,
CSCuv69717, CSCuv69723, CSCuv69732, and CSCuv48908.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  script_set_attribute(attribute:"see_also", value:"http://tools.cisco.com/security/center/viewAlert.x?alertId=40470");
  script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/bid/76372");
  script_set_attribute(attribute:"see_also", value:"http://www.securitytracker.com/id/1033327");
  script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-4324");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(119);

  script_set_attribute(attribute:"vuln_publication_date", value:"2015/08/19");
  script_set_attribute(attribute:"patch_publication_date", value:"2015/08/19");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/07/25");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:4.1%282%29e1%281c%29");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.2%280%29n1%280.1%29");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3%280%29zn%280.81%29");
  script_set_attribute(attribute:"generated_plugin", value:"former");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/Cisco");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/Cisco');

var asset = tenable_ot::assets::get(vendor:'Cisco');

var vuln_cpes = {
    "cpe:/o:cisco:nx-os:7.3%280%29zn%280.81%29" :
        {"versionEndIncluding" : "7.3%280%29zn%280.81%29", "versionStartIncluding" : "7.3%280%29zn%280.81%29", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:4.1%282%29e1%281c%29" :
        {"versionEndIncluding" : "4.1%282%29e1%281c%29", "versionStartIncluding" : "4.1%282%29e1%281c%29", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:7.2%280%29n1%280.1%29" :
        {"versionEndIncluding" : "7.2%280%29n1%280.1%29", "versionStartIncluding" : "7.2%280%29n1%280.1%29", "family" : "NXOS"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_WARNING);
VendorProductVersionCPE
cisconx-os4.1%282%29e1%281c%29cpe:/o:cisco:nx-os:4.1%282%29e1%281c%29
cisconx-os7.2%280%29n1%280.1%29cpe:/o:cisco:nx-os:7.2%280%29n1%280.1%29
cisconx-os7.3%280%29zn%280.81%29cpe:/o:cisco:nx-os:7.3%280%29zn%280.81%29

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

7.2 High

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

69.3%

Related for TENABLE_OT_CISCO_CVE-2015-4324.NASL