Cisco FXOS Software Secure Configuration Bypass (cisco-sa-20190515-nxos-conf-bypass)

medium Nessus Plugin ID 132720

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco FXOS Software is affected by a configuration bypass vulnerability due to a lack of proper validation of system files when the persistent configuration information is read from the file system. An authenticated, local attacker can exploit this, by authenticating to the device and overwriting the persistent configuration storage with malicious executable files. An exploit allows the attacker to run arbitrary commands at system startup with root privileges.

Please see the included Cisco BIDs and Cisco Security Advisory for more information

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvi96584.

See Also

http://www.nessus.org/u?1a24f9c8

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvi96584

Plugin Details

Severity: Medium

ID: 132720

File Name: cisco-sa-20190515-fxos-conf-bypass.nasl

Version: 1.8

Type: local

Family: CISCO

Published: 1/9/2020

Updated: 3/29/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2019-1728

CVSS v3

Risk Factor: Medium

Base Score: 6.7

Temporal Score: 5.8

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:fxos

Required KB Items: installed_sw/FXOS

Exploit Ease: No known exploits are available

Patch Publication Date: 5/15/2019

Vulnerability Publication Date: 5/15/2019

Reference Information

CVE: CVE-2019-1728

BID: 108391

CISCO-SA: cisco-sa-20190515-nxos-conf-bypass

IAVA: 2019-A-0173

CISCO-BUG-ID: CSCvi96584