Cisco IOS Software Common Industrial Protocol Privilege Escalation (cisco-sa-XE-SAP-OPLbze68)

high Nessus Plugin ID 148221

Synopsis

The remote device is missing a vendor-supplied security patch

Description

A vulnerability in the CLI command permissions of Cisco IOS Software could allow an authenticated, local attacker to retrieve the password for Common Industrial Protocol (CIP) and then remotely configure the device as an administrative user. This vulnerability exists because incorrect permissions are associated with the show cip security CLI command. An attacker could exploit this vulnerability by issuing the command to retrieve the password for CIP on an affected device.
A successful exploit could allow the attacker to reconfigure the device

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvu58224

See Also

http://www.nessus.org/u?c5e5f5d9

http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74408

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu58224

Plugin Details

Severity: High

ID: 148221

File Name: cisco-sa-XE-SAP-OPLbze68-ios.nasl

Version: 1.7

Type: combined

Family: CISCO

Published: 3/30/2021

Updated: 9/13/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2021-1392

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 3/24/2021

Vulnerability Publication Date: 3/24/2021

Reference Information

CVE: CVE-2021-1392

CWE: 522

CISCO-SA: cisco-sa-XE-SAP-OPLbze68

CISCO-BUG-ID: CSCvu58224