Cisco IOS XR OpenSSL Security Bypass (CSCup22654)

medium Nessus Plugin ID 88990


The remote device is missing a vendor-supplied security patch.


The remote Cisco device is running a version of IOS XR software that is affected by security bypass vulnerability in the bundled OpenSSL library due to an unspecified error that can allow an attacker to cause the usage of weak keying material, leading to simplified man-in-the-middle attacks.


Upgrade to the relevant fixed version referenced in Cisco bug ID CSCup22654.

See Also

Plugin Details

Severity: Medium

ID: 88990

File Name: cisco-sa-20140605-openssl-iosxr.nasl

Version: 1.12

Type: combined

Family: CISCO

Published: 2/26/2016

Updated: 4/8/2021

Supported Sensors: Nessus

Risk Information


Risk Factor: High

Score: 7.7


Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2014-0224

Vulnerability Information

CPE: cpe:/o:cisco:ios_xr

Required KB Items: Host/Cisco/IOS-XR/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/5/2014

Vulnerability Publication Date: 6/3/2014

Exploitable With

Core Impact

Reference Information

CVE: CVE-2014-0224

BID: 67899

CERT: 978508

CISCO-SA: cisco-sa-20140605-openssl