Cisco NX-OS Software SNMP Access Control List Configuration Name Bypass Vulnerability (CVE-2019-1969)

medium Nessus Plugin ID 128760

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco NX-OS Software is affected by a vulnerability that allows an unauthenticated, remote attacker to perform SNMP polling of an affected device, even when it is configured to deny SNMP traffic. The cause of this vulnerability is an incorrect length check when the configured ACL name is 32 ASCII characters (the maximum length). Though the attacker has no control over the configuration of the SNMP ACL name, an attacker can exploit this vulnerability by performing SNMP polling of an affected device. This allows the attacker to perform SNMP polling that should have been denied.

With SNMP Version 2c or earlier, to exploit this vulnerability the attacker must know the SNMP read-only community string for the affected system. The community string is a password applied to a device which restricts both read-only and read-write access to the SNMP data on the device. Community strings should be treated like all passwords: they must be non-trivial and changed at regular intervals in accordance with network security policies.

With SNMP Version 3, the attacker must have user credentials for the affected system.

Please see the included Cisco BID and Cisco Security Advisory for more information

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvo17439 or apply the workarounds from the vendor advisory.

See Also

http://www.nessus.org/u?307f0135

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvo17439

Plugin Details

Severity: Medium

ID: 128760

File Name: cisco-sa-20190828-nxos-snmp-bypass.nasl

Version: 1.5

Type: combined

Family: CISCO

Published: 9/13/2019

Updated: 11/27/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2019-1969

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Host/Cisco/NX-OS/Version, Host/Cisco/NX-OS/Model, Host/Cisco/NX-OS/Device

Exploit Ease: No known exploits are available

Patch Publication Date: 8/28/2019

Vulnerability Publication Date: 8/28/2019

Reference Information

CVE: CVE-2019-1969

CWE: 264

CISCO-SA: cisco-sa-20190828-nxos-snmp-bypass

IAVA: 2019-A-0317

CISCO-BUG-ID: CSCvo17439