Cisco IOS XR OpenSSL Security Bypass (CSCup22654)

Medium Nessus Plugin ID 88990

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The remote Cisco device is running a version of IOS XR software that is affected by security bypass vulnerability in the bundled OpenSSL library due to an unspecified error that can allow an attacker to cause the usage of weak keying material, leading to simplified man-in-the-middle attacks.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCup22654.

See Also

http://www.nessus.org/u?0aa6a7e6

https://tools.cisco.com/bugsearch/bug/CSCup22654

https://www.openssl.org/news/secadv/20140605.txt

https://www.openssl.org/news/vulnerabilities.html

https://www.imperialviolet.org/2014/06/05/earlyccs.html

Plugin Details

Severity: Medium

ID: 88990

File Name: cisco-sa-20140605-openssl-iosxr.nasl

Version: 1.8

Type: local

Family: CISCO

Published: 2016/02/26

Updated: 2019/04/11

Dependencies: 71430

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios_xr

Required KB Items: Host/Cisco/IOS-XR/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/06/05

Vulnerability Publication Date: 2014/06/03

Reference Information

CVE: CVE-2014-0224

BID: 67899

CERT: 978508

CISCO-BUG-ID: CSCup22654

CISCO-SA: cisco-sa-20140605-openssl