Cisco IOS XE Software Gigabit Ethernet Management Interface Access Control List Bypass Vulnerability

medium Nessus Plugin ID 123793

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco IOS XE Software is affected by following vulnerability

- A vulnerability in access control list (ACL) functionality of the Gigabit Ethernet Management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to reach the configured IP addresses on the Gigabit Ethernet Management interface.The vulnerability is due to a logic error that was introduced in the Cisco IOS XE Software 16.1.1 Release, which prevents the ACL from working when applied against the management interface. An attacker could exploit this issue by attempting to access the device via the management interface. (CVE-2019-1759)

Please see the included Cisco BIDs and Cisco Security Advisory for more information

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvk47405

See Also

http://www.nessus.org/u?99f4882d

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk47405

Plugin Details

Severity: Medium

ID: 123793

File Name: cisco-sa-20190327-mgmtacl.nasl

Version: 1.12

Type: local

Family: CISCO

Published: 4/5/2019

Updated: 2/9/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2019-1759

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios_xe

Required KB Items: Host/Cisco/IOS-XE/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/27/2019

Vulnerability Publication Date: 3/27/2019

Reference Information

CVE: CVE-2019-1759

CWE: 284

CISCO-SA: cisco-sa-20190327-mgmtacl

IAVA: 2019-A-0097-S

CISCO-BUG-ID: CSCvk47405