Cisco IOS XR Software Cisco Discovery Protocol RCE (cisco-sa-20200205-iosxr-cdp-rce)

high Nessus Network Monitor Plugin ID 701265
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, the Cisco IOS XR Software is affected by a remote code execution vulnerability within the Cisco Discovery Protocol due to improper validation of string input. An unauthenticated, adjacent attacker can exploit this to bypass authentication and execute arbitrary commands with root privileges.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvr09190.

See Also

http://www.nessus.org/u?b9623904

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr09190

Plugin Details

Severity: High

ID: 701265

Family: SNMP

Published: 2/18/2020

Updated: 8/18/2020

Dependencies: 700532

Nessus ID: 133603

Risk Information

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.1

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*

Patch Publication Date: 2/5/2020

Vulnerability Publication Date: 2/5/2020

Reference Information

CVE: CVE-2020-3118

IAVA: 2020-A-0041