Ollama alapú vezetői elemzésA következők a legfontosabb ajánlások:
Összkép:
A Cisco eszközökön több kritikus és magas kockázati szintű hibát találtunk. Ezek között vannak biztonsági rések, amelyek lehetővé teszik az egyesített támadásokat, valamint a rendszerre történő bejutást.
Fő kockázati témák:
A Cisco eszközökön több kritikus és magas kockázati szintű hibát találtunk.
Ezek között vannak biztonsági rések, amelyek lehetővé teszik az egyesített támadásokat.
Ajánlott 0–7 nap:
A legfontosabb dolog a kritikus és magas kockázati szintű hibák gyors javítása. A Cisco eszközökön történő biztonsági frissítések elvégzése fontos, hogy megelőzzük az egyesített támadásokat.
Ajánlott 7–30 nap:
A rendszer szintű megelőzéshez javítsuk ki a biztonsági réseket és hajtsuk végre a hardening folyamatot.
Kritikus (3 típus / 3 összes)- Cisco IOS Cluster Management Protocol Telnet Option Handling RCE (cisco-sa-20170317-cmp)
- Cisco IOS Software DHCP Remote Code Execution Vulnerability
- Cisco IOS Software Web Services Remote Code Execution (cisco-sa-http-code-exec-WmfP3h3O)
Magas (28 típus / 41 összes)- SNMP Agent Default Community Name (public)
- Cisco IOS MPLS Forwarding Infrastructure Denial of Service Vulnerability - Cisco Systems
- Cisco IOS Software Multiple Features IP Sockets Vulnerability
- Cisco IOS Software Secure Copy Privilege Escalation Vulnerability - Cisco Systems
- Cisco IOS Software Multiple Features Crafted TCP Sequence Vulnerability - Cisco Systems
- Cisco IOS Software Multiple Features Crafted UDP Packet Vulnerability - Cisco Systems
- TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products - Cisco Systems
- Cisco IOS Software Authentication Proxy Vulnerability - Cisco Systems
- Cisco IOS Software Internet Key Exchange Resource Exhaustion Vulnerability - Cisco Systems
- Cisco IOS Software Tunnels Vulnerability - Cisco Systems
- Cisco IOS Software Multiprotocol Label Switching Packet Vulnerability (cisco-sa-20100324-ldp)
- Cisco IOS Software Multicast Source Discovery Protocol DoS (cisco-sa-20120328-msdp)
- Cisco IOS Software Command Security Bypass (cisco-sa-20120328-pai)
- Cisco IOS Software DHCP Denial of Service Vulnerability (cisco-sa-20120926-dhcp)
- Cisco IOS Software DHCP Version 6 Server Denial of Service Vulnerability (cisco-sa-20120926-dhcpv6)
- Cisco IOS Software DHCP Denial of Service Vulnerability (cisco-sa-20130925-dhcp)
- Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability (cisco-sa-20130925-ntp)
- Cisco IOS Software Multiple Network Address Translation (NAT) Denial of Service Vulnerabilities (cisco-sa-20140326-nat)
- Cisco IOS Software RSVP DoS (cisco-sa-20140924-rsvp)
- Cisco IOS Smart Install Packet Image List Parameter Handling DoS (cisco-sa-20160323-smi)
- Cisco IOS IKEv1 Packet Handling Remote Information Disclosure (cisco-sa-20160916-ikev1) (BENIGNCERTAIN)
- Cisco IOS L2TP Parsing DoS (cisco-sa-20170322-l2tp)
- Cisco IOS Software Link Layer Discovery Protocol Buffer Overflow Vulnerabilities (cisco-sa-20180328-lldp)
- Cisco IOS Software DNS Forwarder Denial of Service Vulnerability (cisco-sa-20160928-dns)
- Cisco IOS DHCP Multiple Vulnerabilities
- Cisco IOS Software Cluster Management Protocol DoS Vulnerability (cisco-sa-20180926-cmp)
- Cisco IOS HTTP Client Information Disclosure Vulnerability (cisco-sa-20190925-http-client)
- Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
Közepes (9 típus / 10 összes)- Unencrypted Telnet Server
- OSPF LSA Manipulation Vulnerability in Cisco IOS (cisco-sa-20130801-lsaospf)
- SNMP 'GETBULK' Reflection DDoS
- Cisco IOS Zone-Based Firewall Feature Security Bypass (CSCun94946)
- Network Time Protocol (NTP) Mode 6 Scanner
- Cisco IOS Software Multiple Vulnerabilities in ntpd (cisco-sa-20150408-ntpd)
- Cisco IOS OSPF LSA Manipulation (cisco-sa-20170727-ospf)
- Cisco IOS Tcl DoS (cisco-sa-tcl-dos-MAZQUnMF)
- Cisco IOS and IOS XE Software Tcl Arbitrary Code Execution (cisco-sa-tcl-ace-C9KuVKmm)
Ollama: llama3.1:8b | ollama version is 0.14.2 | 2026-01-30 17:56
CRITICAL (3)
Cisco IOS Cluster Management Protocol Telnet Option Handling RCE (cisco-sa-20170317-cmp)
According to its self-reported version and configuration, the Cisco IOS software running on the remote device is
affected by a remote code execution vulnerability in the Cluster Management Protocol (CMP) subsystem due to improper
handling of CMP-specific Telnet options. An unauthenticated, remote attacker can exploit this by establishing a Telnet
session with malformed CMP-specific telnet options, to execute arbitrary code.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvd48893. Alternatively, as a workaround, disable
the Telnet protocol for incoming connections.
Cisco IOS Software DHCP Remote Code Execution Vulnerability
According to its self-reported version, the IOS is affected
by one or more vulnerabilities. Please see the included Cisco BIDs
and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCsm45390 and CSCuw77959.
Cisco IOS Software Web Services Remote Code Execution (cisco-sa-http-code-exec-WmfP3h3O)
According to its self-reported version, Cisco IOS Software is affected by a web services remote code exeuction
vulnerability:
- A vulnerability in the web services of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco
Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software
could allow an unauthenticated, remote attacker (Cisco ASA and FTD Software) or authenticated, remote attacker
(Cisco IOS, IOS XE, and IOS XR Software) with low user privileges to execute arbitrary code on an affected device.
This vulnerability is due to improper validation of user-supplied input in HTTP requests. An attacker could exploit
this vulnerability by sending crafted HTTP requests to a targeted web service on an affected device after obtaining
additional information about the system, overcoming exploit mitigations, or both. A successful exploit could allow
the attacker to execute arbitrary code as root, which may lead to the complete compromise of the affected device.
(CVE-2025-20363)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwo35704
HIGH (41)
SNMP Agent Default Community Name (public)
It is possible to obtain the default community name of the remote
SNMP server.
An attacker may use this information to gain more knowledge about the
remote host, or to change the configuration of the remote system (if
the default community allows such modifications).
Javasolt megoldás
Disable the SNMP service on the remote host if you do not use it.
Either filter incoming UDP packets going to this port, or change the
default community string.
Cisco IOS MPLS Forwarding Infrastructure Denial of Service Vulnerability - Cisco Systems
Cisco IOS Software Multi Protocol Label Switching (MPLS) Forwarding
Infrastructure (MFI) is vulnerable to a denial of service (DoS) attack
from specially crafted packets. Only the MFI is affected by this
vulnerability. Older Label Forwarding Information Base (LFIB)
implementation, which is replaced by MFI, is not affected.
Cisco has released free software updates that address this
vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20080924-mfi.
Cisco IOS Software Multiple Features IP Sockets Vulnerability
A vulnerability in the handling of IP sockets can cause devices to be
vulnerable to a denial of service attack when any of several features
of Cisco IOS Software are enabled. A sequence of specially crafted
TCP/IP packets could cause any of the following results:
Cisco has released free software updates that address this
vulnerability.
Several mitigation strategies are outlined in the "Workarounds" section
of this advisory.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090325-ip.
Cisco IOS Software Secure Copy Privilege Escalation Vulnerability - Cisco Systems
The server side of the Secure Copy (SCP) implementation in Cisco IOS
software contains a vulnerability that could allow authenticated users
with an attached command-line interface (CLI) view to transfer files to
and from a Cisco IOS device that is configured to be an SCP server,
regardless of what users are authorized to do, per the CLI view
configuration. This vulnerability could allow valid users to retrieve
or write to any file on the device's file system, including the
device's saved configuration and Cisco IOS image files, even if the CLI
view attached to the user does not allow it. This configuration file
may include passwords or other sensitive information.
The Cisco IOS SCP server is an optional service that is disabled by
default. CLI views are a fundamental component of the Cisco IOS
Role-Based CLI Access feature, which is also disabled by default.
Devices that are not specifically configured to enable the Cisco IOS
SCP server, or that are configured to use it but do not use role-based
CLI access, are not affected by this vulnerability.
This vulnerability does not apply to the Cisco IOS SCP client feature.
Cisco has released free software updates that address this
vulnerability.
There are no workarounds available for this vulnerability apart from
disabling either the SCP server or the CLI view feature if these
services are not required by administrators.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090325-scp.
Cisco IOS Software Multiple Features Crafted TCP Sequence Vulnerability - Cisco Systems
Cisco IOS Software contains a vulnerability in multiple features that
could allow an attacker to cause a denial of service (DoS) condition on
the affected device. A sequence of specially crafted TCP packets can
cause the vulnerable device to reload.
Cisco has released free software updates that address this
vulnerability.
Several mitigation strategies are outlined in the workarounds section
of this advisory.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090325-tcp.
Cisco IOS Software Multiple Features Crafted UDP Packet Vulnerability - Cisco Systems
Several features within Cisco IOS Software are affected by a crafted
UDP packet vulnerability. If any of the affected features are enabled,
a successful attack will result in a blocked input queue on the inbound
interface. Only crafted UDP packets destined for the device could
result in the interface being blocked. Transit traffic will not block
the interface.
Cisco has released free software updates that address this
vulnerability and workarounds that mitigate this vulnerability are
available.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090325-udp.
TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products - Cisco Systems
Multiple Cisco products are affected by denial of service (DoS)
vulnerabilities that manipulate the state of Transmission Control
Protocol (TCP) connections. By manipulating the state of a TCP
connection, an attacker could force the TCP connection to remain in a
long-lived state, possibly indefinitely. If enough TCP connections are
forced into a long-lived or indefinite state, resources on a system
under attack may be consumed, preventing new TCP connections from being
accepted. In some cases, a system reboot may be necessary to recover
normal system operation. To exploit these vulnerabilities, an attacker
must be able to complete a TCP three-way handshake with a vulnerable
system.
In addition to these vulnerabilities, Cisco Nexus 5000 devices contain
a TCP DoS vulnerability that may result in a system crash. This
additional vulnerability was found as a result of testing the TCP state
manipulation vulnerabilities.
Cisco has released free software updates for download from the Cisco
website that address these vulnerabilities. Workarounds that mitigate
these vulnerabilities are available.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090908-tcp24.
TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products - Cisco Systems
Multiple Cisco products are affected by denial of service (DoS)
vulnerabilities that manipulate the state of Transmission Control
Protocol (TCP) connections. By manipulating the state of a TCP
connection, an attacker could force the TCP connection to remain in a
long-lived state, possibly indefinitely. If enough TCP connections are
forced into a long-lived or indefinite state, resources on a system
under attack may be consumed, preventing new TCP connections from being
accepted. In some cases, a system reboot may be necessary to recover
normal system operation. To exploit these vulnerabilities, an attacker
must be able to complete a TCP three-way handshake with a vulnerable
system.
In addition to these vulnerabilities, Cisco Nexus 5000 devices contain
a TCP DoS vulnerability that may result in a system crash. This
additional vulnerability was found as a result of testing the TCP state
manipulation vulnerabilities.
Cisco has released free software updates for download from the Cisco
website that address these vulnerabilities. Workarounds that mitigate
these vulnerabilities are available.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090908-tcp24.
Cisco IOS Software Authentication Proxy Vulnerability - Cisco Systems
Cisco IOS Software configured with Authentication Proxy for HTTP(S),
Web Authentication or the consent feature, contains a vulnerability
that may allow an unauthenticated session to bypass the authentication
proxy server or bypass the consent webpage.
Cisco has released free software updates that address this
vulnerability.
There are no workarounds that mitigate this vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090923-auth-proxy.
Cisco IOS Software Internet Key Exchange Resource Exhaustion Vulnerability - Cisco Systems
Cisco IOS devices that are configured for Internet Key Exchange (IKE)
protocol and certificate based authentication are vulnerable to a
resource exhaustion attack. Successful exploitation of this
vulnerability may result in the allocation of all available Phase 1
security associations (SA) and prevent the establishment of new IPsec
sessions.
Cisco has released free software updates that address this
vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090923-ipsec.
Cisco IOS Software Tunnels Vulnerability - Cisco Systems
Cisco devices running affected versions of Cisco IOS Software are
vulnerable to a denial of service (DoS) attack if configured for IP
tunnels and Cisco Express Forwarding.
Cisco has released free software updates that address this
vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090923-tunnels.
Cisco IOS Software Tunnels Vulnerability - Cisco Systems
Cisco devices running affected versions of Cisco IOS Software are
vulnerable to a denial of service (DoS) attack if configured for IP
tunnels and Cisco Express Forwarding.
Cisco has released free software updates that address this
vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20090923-tunnels.
Cisco IOS Software Multiprotocol Label Switching Packet Vulnerability (cisco-sa-20100324-ldp)
A device running Cisco IOS Software, Cisco IOS XE Software, or Cisco
IOS XR Software is vulnerable to a remote denial of service (DoS)
condition if it is configured for Multiprotocol Label Switching (MPLS)
and has support for Label Distribution Protocol (LDP). A crafted LDP
UDP packet can cause an affected device running Cisco IOS Software or
Cisco IOS XE Software to reload. On devices running affected versions
of Cisco IOS XR Software, such packets can cause the device to restart
the mpls_ldp process. A system is vulnerable if configured with either
LDP or Tag Distribution Protocol (TDP). Cisco has released free
software updates that address this vulnerability. Workarounds that
mitigate this vulnerability are available.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20100324-ldp.
Cisco IOS Software Multicast Source Discovery Protocol DoS (cisco-sa-20120328-msdp)
According to its self-reported version number, the remote Cisco IOS
device is affected by a denial of service vulnerability in the
Multicast Source Discovery Protocol (MSDP) implementation. An
unauthenticated, remote attacker can exploit this, via an MSDP packet
containing encapsulated IGMP data, to cause the device to reload.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco Security
Advisory cisco-sa-20120328-msdp. Alternatively, apply the workarounds
detailed in the vendor advisory.
Cisco IOS Software Command Security Bypass (cisco-sa-20120328-pai)
According to its self-reported version and configuration, the Cisco
IOS software running on the remote device is affected by a security
bypass vulnerability in the Authentication, Authorization, and
Accounting (AAA) feature. An authenticated, remote attacker can
exploit this, via an HTTP or HTTPS session, to bypass access
restrictions and execute any IOS command that is configured for the
authorization level. This vulnerability requires that the HTTP or
HTTPS server is enabled on the Cisco IOS device.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20120328-pai. Alternatively, the HTTP server may be disabled
as a workaround.
Cisco IOS Software DHCP Denial of Service Vulnerability (cisco-sa-20120926-dhcp)
Cisco IOS Software contains a vulnerability that could allow an
unauthenticated, remote attacker to cause a denial of service (DoS)
condition. An attacker could exploit this vulnerability by sending a
single DHCP packet to or through an affected device, causing the
device to reload. Cisco has released free software updates that
address this vulnerability. A workaround that mitigates this
vulnerability is available.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20120926-dhcp.
Cisco IOS Software DHCP Version 6 Server Denial of Service Vulnerability (cisco-sa-20120926-dhcpv6)
Cisco IOS Software and Cisco IOS XE Software contain a vulnerability
that could allow an unauthenticated, remote attacker to cause a denial
of service (DoS) condition. An attacker could exploit this
vulnerability by sending a crafted request to an affected device that
has the DHCP version 6 (DHCPv6) server feature enabled, causing a
reload. Cisco has released free software updates that address this
vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20120926-dhcpv6.
Cisco IOS Software DHCP Denial of Service Vulnerability (cisco-sa-20130925-dhcp)
A vulnerability exists in the DHCP implementation of Cisco IOS
Software that could allow an unauthenticated, remote attacker to cause
a denial of service (DoS) condition. The vulnerability occurs during
the parsing of crafted DHCP packets. An attacker could exploit this
vulnerability by sending crafted DHCP packets to an affected device
that has the DHCP server or DHCP relay feature enabled. An exploit
could allow the attacker to cause a reload of an affected device.
Cisco has released free software updates that address this
vulnerability. There are no workarounds to this vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20130925-dhcp.
Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability (cisco-sa-20130925-ntp)
A vulnerability in the implementation of the Network Time Protocol
(NTP) feature in Cisco IOS Software could allow an unauthenticated,
remote attacker to cause an affected device to reload, resulting in a
denial of service (DoS) condition. The vulnerability is due to the
improper handling of multicast NTP packets that are sent to an
affected device encapsulated in a Multicast Source Discovery Protocol
(MSDP) Source-Active (SA) message from a configured MSDP peer. An
attacker could exploit this vulnerability by sending multicast NTP
packets to an affected device. Repeated exploitation could result in a
sustained DoS condition. Cisco has released free software updates that
address this vulnerability. A workaround is available to mitigate this
vulnerability.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20130925-ntp.
Cisco IOS Software Multiple Network Address Translation (NAT) Denial of Service Vulnerabilities (cisco-sa-20140326-nat)
According to its self-reported version, the version of Cisco IOS
running on the remote host is affected by multiple denial of service
vulnerabilities in the Network Address Translation (NAT)
implementation :
- An issue exists in the TCP Input module due to the
improper handling of certain sequences of TCP packets.
An unauthenticated, remote attacker could potentially
exploit this issue by sending a specific sequence of
IPv4 TCP packets resulting in a denial of service.
(CVE-2014-2109)
- An issue exists in the Application Layer Gateway (ALG)
module due to the improper handling of malformed DNS
packets during the NAT procedure. An unauthenticated,
remote attacker could potentially exploit this issue by
sending malformed IPv4 DNS packets resulting in a denial
of service. (CVE-2014-2111)
Note that IPv6 packets cannot be used to exploit these issues.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20140326-nat.
Cisco IOS Software Multiple Network Address Translation (NAT) Denial of Service Vulnerabilities (cisco-sa-20140326-nat)
According to its self-reported version, the version of Cisco IOS
running on the remote host is affected by multiple denial of service
vulnerabilities in the Network Address Translation (NAT)
implementation :
- An issue exists in the TCP Input module due to the
improper handling of certain sequences of TCP packets.
An unauthenticated, remote attacker could potentially
exploit this issue by sending a specific sequence of
IPv4 TCP packets resulting in a denial of service.
(CVE-2014-2109)
- An issue exists in the Application Layer Gateway (ALG)
module due to the improper handling of malformed DNS
packets during the NAT procedure. An unauthenticated,
remote attacker could potentially exploit this issue by
sending malformed IPv4 DNS packets resulting in a denial
of service. (CVE-2014-2111)
Note that IPv6 packets cannot be used to exploit these issues.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20140326-nat.
Cisco IOS Software RSVP DoS (cisco-sa-20140924-rsvp)
According to its self-reported version, the version of Cisco IOS
running on the remote host is affected by a denial of service
vulnerability in the Resource Reservation Protocol (RSVP)
implementation due to improper handling of RSVP packets. A remote
attacker can exploit this issue by sending specially crafted RSVP
packets to cause the device to reload.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20140924-rsvp.
Cisco IOS Smart Install Packet Image List Parameter Handling DoS (cisco-sa-20160323-smi)
According to its self-reported version, the Cisco IOS software running
on the remote device is affected by a denial of service vulnerability
in the Smart Install client feature due to improper handling of image
list parameters. An unauthenticated, remote attacker can exploit this
issue, via crafted Smart Install packets, to cause the device to
reload.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCuv45410. Alternatively, disable the Smart Install feature per the
vendor advisory.
Cisco IOS IKEv1 Packet Handling Remote Information Disclosure (cisco-sa-20160916-ikev1) (BENIGNCERTAIN)
According to its self-reported version and configuration, the Cisco
IOS software running on the remote device is affected by an
information disclosure vulnerability, known as BENIGNCERTAIN, in the
Internet Key Exchange version 1 (IKEv1) subsystem due to improper
handling of IKEv1 security negotiation requests. An unauthenticated,
remote attacker can exploit this issue, via a specially crafted IKEv1
packet, to disclose memory contents, resulting in the disclosure of
confidential information including credentials and configuration
settings.
BENIGNCERTAIN is one of multiple Equation Group vulnerabilities and
exploits disclosed on 2016/08/14 by a group known as the Shadow
Brokers.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCvb29204.
Cisco IOS L2TP Parsing DoS (cisco-sa-20170322-l2tp)
According to its self-reported version, the Cisco IOS software running
on the remote device is affected by a denial of service vulnerability
in its Layer 2 Tunneling Protocol (L2TP) parsing function due to
insufficient validation of L2TP packets. An unauthenticated, remote
attacker can exploit this issue, via a specially crafted L2TP packet,
to cause the device to reload.
Note that this issue only affects devices if the L2TP feature is
enabled and the device is configured as an L2TP Version 2 (L2TPv2) or
L2TP Version 3 (L2TPv3) endpoint. By default, the L2TP feature is not
enabled.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCuy82078.
Cisco IOS Software Link Layer Discovery Protocol Buffer Overflow Vulnerabilities (cisco-sa-20180328-lldp)
According to its self-reported version, the IOS is affected
by one or more vulnerabilities. Please see the included Cisco BIDs
and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCvd73487 and CSCvd73664.
Cisco IOS Software Link Layer Discovery Protocol Buffer Overflow Vulnerabilities (cisco-sa-20180328-lldp)
According to its self-reported version, the IOS is affected
by one or more vulnerabilities. Please see the included Cisco BIDs
and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCvd73487 and CSCvd73664.
Cisco IOS Software DNS Forwarder Denial of Service Vulnerability (cisco-sa-20160928-dns)
According to its self-reported version, the IOS is affected
by one or more vulnerabilities. Please see the included Cisco BIDs
and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCup90532.
Cisco IOS DHCP Multiple Vulnerabilities
According to its self-reported version, the Cisco IOS software running
on the remote device is affected by multiple denial of service
vulnerabilities in the DHCP client implementation when parsing DHCP
packets. An unauthenticated, remote attacker can exploit these issues,
via specially crafted DHCP packets, to cause the device to reload.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCvg62730, CSCvg62754, and CSCuh91645.
Cisco IOS DHCP Multiple Vulnerabilities
According to its self-reported version, the Cisco IOS software running
on the remote device is affected by multiple denial of service
vulnerabilities in the DHCP client implementation when parsing DHCP
packets. An unauthenticated, remote attacker can exploit these issues,
via specially crafted DHCP packets, to cause the device to reload.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCvg62730, CSCvg62754, and CSCuh91645.
Cisco IOS DHCP Multiple Vulnerabilities
According to its self-reported version, the Cisco IOS software running
on the remote device is affected by multiple denial of service
vulnerabilities in the DHCP client implementation when parsing DHCP
packets. An unauthenticated, remote attacker can exploit these issues,
via specially crafted DHCP packets, to cause the device to reload.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID
CSCvg62730, CSCvg62754, and CSCuh91645.
Cisco IOS Software Cluster Management Protocol DoS Vulnerability (cisco-sa-20180926-cmp)
According to its self-reported version, the IOS is affected
by one or more vulnerabilities. Please see the included Cisco BIDs
and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCvg48576.
Cisco IOS HTTP Client Information Disclosure Vulnerability (cisco-sa-20190925-http-client)
According to its self-reported version, IOS is affected by a vulnerability in the HTTP client feature that allows an
unauthenticated, remote attacker to read and modify data that should normally be sent via an encrypted channel. This
vulnerability is due to TCP port information not being considered when matching new requests to existing, persistent
HTTP connections. An attacker can exploit this vulnerability by acting as a man-in-the-middle and then reading and/or
modifying data that should normally have been set through an encrypted channel.
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvf36258
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities.
- A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an
authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due
to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by
sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to
cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects
SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must
know a valid read-write or read-only SNMP community string for the affected system. To exploit this
vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175,
CVE-2025-20176)
- A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR
Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit
this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE
Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly,
resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to
cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device.
Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP
versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a
valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability
through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20172)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577,
CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities.
- A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an
authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due
to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by
sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to
cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects
SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must
know a valid read-write or read-only SNMP community string for the affected system. To exploit this
vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175,
CVE-2025-20176)
- A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR
Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit
this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE
Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly,
resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to
cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device.
Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP
versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a
valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability
through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20172)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577,
CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities.
- A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an
authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due
to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by
sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to
cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects
SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must
know a valid read-write or read-only SNMP community string for the affected system. To exploit this
vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175,
CVE-2025-20176)
- A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR
Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit
this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE
Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly,
resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to
cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device.
Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP
versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a
valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability
through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20172)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577,
CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities.
- A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an
authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due
to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by
sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to
cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects
SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must
know a valid read-write or read-only SNMP community string for the affected system. To exploit this
vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175,
CVE-2025-20176)
- A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR
Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit
this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE
Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly,
resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to
cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device.
Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP
versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a
valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability
through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20172)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577,
CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities.
- A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an
authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due
to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by
sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to
cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects
SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must
know a valid read-write or read-only SNMP community string for the affected system. To exploit this
vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175,
CVE-2025-20176)
- A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR
Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit
this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE
Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly,
resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to
cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device.
Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP
versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a
valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability
through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20172)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577,
CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities.
- A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an
authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due
to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by
sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to
cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects
SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must
know a valid read-write or read-only SNMP community string for the affected system. To exploit this
vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175,
CVE-2025-20176)
- A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR
Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit
this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE
Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly,
resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to
cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device.
Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP
versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a
valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability
through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20172)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577,
CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities.
- A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an
authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due
to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by
sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to
cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects
SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must
know a valid read-write or read-only SNMP community string for the affected system. To exploit this
vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175,
CVE-2025-20176)
- A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR
Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit
this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE
Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly,
resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to
cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device.
Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP
versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a
valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability
through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20172)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577,
CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
Cisco IOS Software SNMP DoS (cisco-sa-snmp-dos-sdxnSUcW)
According to its self-reported version, Cisco IOS is affected by multiple vulnerabilities.
- A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an
authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due
to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by
sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to
cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects
SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must
know a valid read-write or read-only SNMP community string for the affected system. To exploit this
vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20169, CVE-2025-20170, CVE-2025-20171, CVE-2025-20173, CVE-2025-20174, CVE-2025-20175,
CVE-2025-20176)
- A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR
Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.
This vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit
this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE
Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly,
resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to
cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device.
Devices that are running Cisco IOS XR Software will not reload. This vulnerability affects SNMP
versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a
valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability
through SNMP v3, the attacker must have valid SNMP user credentials for the affected system.
(CVE-2025-20172)
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm79554, CSCwm79564, CSCwm79570, CSCwm79577,
CSCwm79581, CSCwm79590, CSCwm79596, CSCwm89600, CSCwn08493
MEDIUM (10)
Unencrypted Telnet Server
Plugin ID: 42263
Port: tcp/23
The remote host is running a Telnet server over an unencrypted
channel.
Using Telnet over an unencrypted channel is not recommended as logins,
passwords, and commands are transferred in cleartext. This allows a
remote, man-in-the-middle attacker to eavesdrop on a Telnet session to
obtain credentials or other sensitive information and to modify
traffic exchanged between a client and server.
SSH is preferred over Telnet since it protects credentials from
eavesdropping and can tunnel additional data streams such as an X11
session.
Javasolt megoldás
Disable the Telnet service and use SSH instead.
OSPF LSA Manipulation Vulnerability in Cisco IOS (cisco-sa-20130801-lsaospf)
The remote Cisco IOS device is affected by a vulnerability
involving the Open Shortest Path First (OSPF) Routing Protocol Link
State Advertisement (LSA) database. This vulnerability could be
exploited by injecting specially crafted OSPF packets. Successful
exploitation could allow an unauthenticated attacker to manipulate or
disrupt the flow of network traffic through the device.
Javasolt megoldás
Apply the relevant patch referenced in Cisco Security Advisory
cisco-sa-20130801-lsaospf.
SNMP 'GETBULK' Reflection DDoS
The remote SNMP daemon is responding with a large amount of data to a
'GETBULK' request with a larger than normal value for
'max-repetitions'. A remote attacker can use this SNMP server to
conduct a reflected distributed denial of service attack on an
arbitrary remote host.
Javasolt megoldás
Disable the SNMP service on the remote host if you do not use it.
Otherwise, restrict and monitor access to this service, and consider
changing the default 'public' community string.
Cisco IOS Zone-Based Firewall Feature Security Bypass (CSCun94946)
According to its self-reported version, the Cisco IOS software running
on the remote device is affected by a security bypass vulnerability
in the Zone-Based Firewall feature due to insufficient zone checking
for traffic belonging to existing sessions. An unauthenticated, remote
attacker can exploit this, by injecting spoofed traffic that matches
existing connections, to bypass security access restrictions on the
device and gain access to resources.
Javasolt megoldás
Apply the relevant patch referenced in the Cisco security advisory.
Alternatively, disable the Zone-Based Firewall feature according to
the vendor advisory.
Network Time Protocol (NTP) Mode 6 Scanner
Plugin ID: 97861
Port: udp/123
The remote NTP server responds to mode 6 queries. Devices that respond
to these queries have the potential to be used in NTP amplification
attacks. An unauthenticated, remote attacker could potentially exploit
this, via a specially crafted mode 6 query, to cause a reflected
denial of service condition.
Javasolt megoldás
Restrict NTP mode 6 queries.
Cisco IOS Software Multiple Vulnerabilities in ntpd (cisco-sa-20150408-ntpd)
According to its self-reported version, the IOS is affected
by one or more vulnerabilities. Please see the included Cisco BIDs
and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCut77619.
Cisco IOS Software Multiple Vulnerabilities in ntpd (cisco-sa-20150408-ntpd)
According to its self-reported version, the IOS is affected
by one or more vulnerabilities. Please see the included Cisco BIDs
and the Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCut77619.
Cisco IOS OSPF LSA Manipulation (cisco-sa-20170727-ospf)
According to its self-reported version, Cisco IOS is affected by a vulnerability involving the Open Shortest Path First
(OSPF) Routing Protocol Link State Advertisement (LSA) database. An unauthenticated, remote attacker can exploit this,
by injecting crafted OSPF LSA type 1 packets, to cause the targeted router to flush its routing table and propagate the
crafted OSPF LSA type 1 update through the OSPF AS domain, allowing the attacker to intercept or black-hole traffic.
Successful exploitation of this vulnerability requires that an attacker first accurately determine certain parameters
within the LSA database on the target router.
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID(s) CSCva74756.
Cisco IOS Tcl DoS (cisco-sa-tcl-dos-MAZQUnMF)
According to its self-reported version, IOS is affected by a vulnerability in the Tool Command Line (Tcl) interpreter
due to insufficient input validation of data passed to the Tcl interpreter. An authenticated, unprivileged, and local
attacker can exploit this, by executing crafted Tcl arguments on an affected device, in order to cause a denial of
service (DoS) condition on an affected system.
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvq28110
Cisco IOS and IOS XE Software Tcl Arbitrary Code Execution (cisco-sa-tcl-ace-C9KuVKmm)
According to its self-reported version, IOS is affected by a Arbitrary Code Execution vulnerability. An authenticated,
local attacker with privileged EXEC credentials to execute arbitrary code on the underlying operating system (OS) with
root privileges. The vulnerability is due to insufficient input validation of data passed to the Tcl interpreter. A
successful exploit could allow the attacker to cause memory corruption or execute the code with root privileges on the
underlying OS of the affected device.
Please see the included Cisco BIDs and Cisco Security Advisory for more information.
Javasolt megoldás
Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvq05584
LOW (2)
ICMP Timestamp Request Remote Date Disclosure
The remote host answers to an ICMP timestamp request. This allows an
attacker to know the date that is set on the targeted machine, which
may assist an unauthenticated, remote attacker in defeating time-based
authentication protocols.
Timestamps returned from machines running Windows Vista / 7 / 2008 /
2008 R2 are deliberately incorrect, but usually within 1000 seconds of
the actual system time.
Javasolt megoldás
Filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).
SNMP Request Cisco Router Information Disclosure
Plugin ID: 10969
Port: udp/161
It is possible to determine the model of the remote CISCO system by
sending SNMP requests with the OID 1.3.6.1.4.1.9.1.
An attacker may use this information to gain more knowledge about the
remote host.
Javasolt megoldás
Disable the SNMP service on the remote host if you do not use it, or
filter incoming UDP packets going to this port.