Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.TENABLE_OT_CISCO_CVE-2017-3883.NASL
HistoryJul 25, 2023 - 12:00 a.m.

Cisco FXOS and NX-OS System Software Authentication, Authorization, and Accounting Denial of Service (CVE-2017-3883)

2023-07-2500:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
6
cisco
fxos
nx-os
authentication
authorization
accounting
denial of service
vulnerability
remote attacker
reload
firepower
nexus
ucs

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

EPSS

0.002

Percentile

65.0%

A vulnerability in the authentication, authorization, and accounting (AAA) implementation of Cisco Firepower Extensible Operating System (FXOS) and NX-OS System Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability occurs because AAA processes prevent the NX-OS System Manager from receiving keepalive messages when an affected device receives a high rate of login attempts, such as in a brute-force login attack. System memory can run low on the FXOS devices under the same conditions, which could cause the AAA process to unexpectedly restart or cause the device to reload. An attacker could exploit this vulnerability by performing a brute-force login attack against a device that is configured with AAA security services. A successful exploit could allow the attacker to cause the affected device to reload. This vulnerability affects the following Cisco products if they are running Cisco FXOS or NX-OS System Software that is configured for AAA services: Firepower 4100 Series Next-Generation Firewall, Firepower 9300 Security Appliance, Multilayer Director Switches, Nexus 1000V Series Switches, Nexus 1100 Series Cloud Services Platforms, Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, Unified Computing System (UCS) 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs:
CSCuq58760, CSCuq71257, CSCur97432, CSCus05214, CSCux54898, CSCvc33141, CSCvd36971, CSCve03660.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(501393);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/07/26");

  script_cve_id("CVE-2017-3883");

  script_name(english:"Cisco FXOS and NX-OS System Software Authentication, Authorization, and Accounting Denial of Service (CVE-2017-3883)");

  script_set_attribute(attribute:"synopsis", value:
"The remote OT asset is affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"A vulnerability in the authentication, authorization, and accounting
(AAA) implementation of Cisco Firepower Extensible Operating System
(FXOS) and NX-OS System Software could allow an unauthenticated,
remote attacker to cause an affected device to reload. The
vulnerability occurs because AAA processes prevent the NX-OS System
Manager from receiving keepalive messages when an affected device
receives a high rate of login attempts, such as in a brute-force login
attack. System memory can run low on the FXOS devices under the same
conditions, which could cause the AAA process to unexpectedly restart
or cause the device to reload. An attacker could exploit this
vulnerability by performing a brute-force login attack against a
device that is configured with AAA security services. A successful
exploit could allow the attacker to cause the affected device to
reload. This vulnerability affects the following Cisco products if
they are running Cisco FXOS or NX-OS System Software that is
configured for AAA services: Firepower 4100 Series Next-Generation
Firewall, Firepower 9300 Security Appliance, Multilayer Director
Switches, Nexus 1000V Series Switches, Nexus 1100 Series Cloud
Services Platforms, Nexus 2000 Series Switches, Nexus 3000 Series
Switches, Nexus 3500 Platform Switches, Nexus 5000 Series Switches,
Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000
Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series
Switches, Nexus 9000 Series Switches in NX-OS mode, Nexus 9500
R-Series Line Cards and Fabric Modules, Unified Computing System (UCS)
6100 Series Fabric Interconnects, UCS 6200 Series Fabric
Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs:
CSCuq58760, CSCuq71257, CSCur97432, CSCus05214, CSCux54898,
CSCvc33141, CSCvd36971, CSCve03660.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.");
  # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-aaavty
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b71cc502");
  script_set_attribute(attribute:"see_also", value:"http://www.securitytracker.com/id/1039614");
  script_set_attribute(attribute:"see_also", value:"http://www.securityfocus.com/bid/101493");
  # https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03846en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?38892564");
  script_set_attribute(attribute:"solution", value:
"Refer to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-3883");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_cwe_id(770);

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/10/19");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/10/19");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/07/25");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:2");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:2.5");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:3.0");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:3.1");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:3.2");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:4");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:5");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:5.2");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.1");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.2");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:6.3");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.0");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.0%283%29i3%281%29");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.1%280.1%29");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:7.3");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.1");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:nx-os:8.2");
  script_set_attribute(attribute:"generated_plugin", value:"former");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Tenable.ot");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("tenable_ot_api_integration.nasl");
  script_require_keys("Tenable.ot/Cisco");

  exit(0);
}


include('tenable_ot_cve_funcs.inc');

get_kb_item_or_exit('Tenable.ot/Cisco');

var asset = tenable_ot::assets::get(vendor:'Cisco');

var vuln_cpes = {
    "cpe:/o:cisco:nx-os:5.2" :
        {"versionEndIncluding" : "5.2", "versionStartIncluding" : "5.2", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:6.2" :
        {"versionEndIncluding" : "6.2", "versionStartIncluding" : "6.2", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:6.3" :
        {"versionEndIncluding" : "6.3", "versionStartIncluding" : "6.3", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:7.3" :
        {"versionEndIncluding" : "7.3", "versionStartIncluding" : "7.3", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:8.1" :
        {"versionEndIncluding" : "8.1", "versionStartIncluding" : "8.1", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:8.2" :
        {"versionEndIncluding" : "8.2", "versionStartIncluding" : "8.2", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:4" :
        {"versionEndIncluding" : "4.1", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:6" :
        {"versionEndIncluding" : "6.0", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:7.0" :
        {"versionEndIncluding" : "7.0", "versionStartIncluding" : "7.0", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:7.0%283%29i3%281%29" :
        {"versionEndIncluding" : "7.0%283%29i3%281%29", "versionStartIncluding" : "7.0%283%29i3%281%29", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:5" :
        {"versionEndIncluding" : "5.2", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:7.1%280.1%29" :
        {"versionEndIncluding" : "7.1%280.1%29", "versionStartIncluding" : "7.1%280.1%29", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:6.1" :
        {"versionEndIncluding" : "6.1", "versionStartIncluding" : "6.1", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:2" :
        {"versionEndIncluding" : "2.2", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:2.5" :
        {"versionEndIncluding" : "2.5", "versionStartIncluding" : "2.5", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:3.0" :
        {"versionEndIncluding" : "3.0", "versionStartIncluding" : "3.0", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:3.1" :
        {"versionEndIncluding" : "3.1", "versionStartIncluding" : "3.1", "family" : "NXOS"},
    "cpe:/o:cisco:nx-os:3.2" :
        {"versionEndIncluding" : "3.2", "versionStartIncluding" : "3.2", "family" : "NXOS"}
};

tenable_ot::cve::compare_and_report(asset:asset, cpes:vuln_cpes, severity:SECURITY_WARNING);

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

EPSS

0.002

Percentile

65.0%

Related for TENABLE_OT_CISCO_CVE-2017-3883.NASL