Synopsis
The remote OT asset is affected by a vulnerability.
Description
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak or a reload of an affected device that leads to a denial of service (DoS) condition.
The vulnerability is due to incorrect processing of certain IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device to be processed. A successful exploit could cause an affected device to continuously consume memory and eventually reload, resulting in a DoS condition.
This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.
Solution
The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.
Rockwell Automation has released knowledge base article 1073313 which can be found at the following location:
https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1073313/ (login required)
Cisco has released Snort Rules 46110 and 46111 to help address CVE-2018-0158 and CVE-2018-0151. See new rules at:
https://www.cisco.com/web/software/286271056/117258/sf-rules-2018-03-29-new.html
CVE-2018-0151: Users who do not use the Adaptive QoS for DMVPN feature can deny all traffic destined to UDP port 18999 on an affected device by using a Control Plane Policing (CoPP) policy. If the Adaptive QoS for DMVPN feature is later configured, the device must be upgraded to an unaffected release of Cisco IOS Software or Cisco IOS XE Software and the CoPP policy must be removed.
CVE-2018-0167 and CVE-2018-0175 have no specific mitigations in place. See the following Cisco Vulnerability advisory for more details:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldp
Rockwell Automation also recommends that users implement the following general security guidelines:
- Help minimize network exposure for all control system devices and/or systems, and confirm that they are not accessible from the Internet.
- Locate control system networks and devices behind firewalls, and isolate them from the business network.
- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.
Plugin Details
Supported Sensors: Tenable OT Security
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
Vulnerability Information
CPE: cpe:/h:rockwellautomation:allen-bradley_stratix_5900_industrial_managed_ethernet_switch, cpe:/h:rockwellautomation:allen-bradley_stratix_5400_industrial_managed_ethernet_switch, cpe:/h:rockwellautomation:allen-bradley_stratix_5410_industrial_managed_ethernet_switch, cpe:/h:rockwellautomation:allen-bradley_stratix_5700_industrial_managed_ethernet_switch, cpe:/h:rockwellautomation:allen-bradley_stratix_8000_industrial_managed_ethernet_switch
Required KB Items: Tenable.ot/Rockwell
Exploit Ease: Exploits are available
Patch Publication Date: 3/28/2018
Vulnerability Publication Date: 3/28/2018
CISA Known Exploited Vulnerability Due Dates: 3/17/2022