Executive Summary
Summary | |
---|---|
Title | Cisco IOS XE Software for Cisco ASR 1000 Series and cBR-8 Routers Line Card Console Access Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20170927-cc | First vendor Publication | 2017-09-27 |
Vendor | Cisco | Last vendor Modification | 2017-09-27 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in motherboard console ports of line cards for Cisco ASR 1000 Series Aggregation Services Routers and Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, physical attacker to access an affected device's operating system. The vulnerability exists because an engineering console port is available on the motherboard of the affected line cards. An attacker could exploit this vulnerability by physically connecting to the console port on the line card. A successful exploit could allow the attacker to gain full access to the affected device's operating system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc"] This advisory is part of the September 27, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 13 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-63410"]. BEGIN PGP SIGNATURE iQKBBAEBAgBrBQJZy82BZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHkvLQ//RzZe/ReOEDNrWcek JBpvdpv0EiYdtsqWc786BX+//Pgj89u+/LOU7dpfr4aD/3fu83J77yPpeD2+QosW VTCh3+SK9RSuq8xSkk16TXUWDFbDjrPvjJBEP8jDQE9APQbqmMSJ2Ad29TTslR9h WVv3aGIBPSWwy7jtYOh7PJD9gEZG7ndF+0N+a4s6evErFpO3Jna0W7JbBVeCqTKc /DjvOGYnskHL/BANkXNdrKt0neoSWva6rh/tVkeIVfE+jZKhyvdGOhKt2yw8no/B I3z7k0unCXNLMxOICmRtcX23498769utZdbJwQMPSiYpspBgTHmUWmB0CBP5Aa1K 2O4U8hWK7DFamnYp9JutsH8kh3DuwkGubtLCaCShC9fCzLF2qJ3aGQ6Cc4t7RuN9 B0RM9L1kTRyxEYsp7KkkqhQ4Gbn2vXeNZXR+fs3wtntAU8o75wE985GmdED6ibzF TPg+g0MED4RZb5y8p0cRuHfjSM6ornearmPuYy4JkfExq7jpXqZQfxwAS4VdsihD AdDh/8GEE9u9LbwPNQBZ8GSTVpnw+SS8WrTvvEDdw/KRiteCP55XTx8hpMu+HYkF fKXrVADRkgXsWON4EYjoHO3Cm3aPU5VFcdiqL14HilmnbV/PcL6OjQs8IvZPjgrK j5ROTG1Ka/w+y3X7elDT661650E= =81iV END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-798 | Use of Hard-coded Credentials (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-10-06 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20170927-cc.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-10-07 13:25:06 |
|
2017-10-06 21:25:50 |
|
2017-09-29 09:26:02 |
|
2017-09-27 21:23:06 |
|