Executive Summary

Title Cisco IOS XE Software for Cisco ASR 1000 Series and cBR-8 Routers Line Card Console Access Vulnerability
Name cisco-sa-20170927-cc First vendor Publication 2017-09-27
Vendor Cisco Last vendor Modification 2017-09-27
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


A vulnerability in motherboard console ports of line cards for Cisco ASR 1000 Series Aggregation Services Routers and Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, physical attacker to access an affected device's operating system.

The vulnerability exists because an engineering console port is available on the motherboard of the affected line cards. An attacker could exploit this vulnerability by physically connecting to the console port on the line card. A successful exploit could allow the attacker to gain full access to the affected device's operating system.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc"]

This advisory is part of the September 27, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 13 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-63410"].


iQKBBAEBAgBrBQJZy82BZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHkvLQ//RzZe/ReOEDNrWcek JBpvdpv0EiYdtsqWc786BX+//Pgj89u+/LOU7dpfr4aD/3fu83J77yPpeD2+QosW VTCh3+SK9RSuq8xSkk16TXUWDFbDjrPvjJBEP8jDQE9APQbqmMSJ2Ad29TTslR9h WVv3aGIBPSWwy7jtYOh7PJD9gEZG7ndF+0N+a4s6evErFpO3Jna0W7JbBVeCqTKc /DjvOGYnskHL/BANkXNdrKt0neoSWva6rh/tVkeIVfE+jZKhyvdGOhKt2yw8no/B I3z7k0unCXNLMxOICmRtcX23498769utZdbJwQMPSiYpspBgTHmUWmB0CBP5Aa1K 2O4U8hWK7DFamnYp9JutsH8kh3DuwkGubtLCaCShC9fCzLF2qJ3aGQ6Cc4t7RuN9 B0RM9L1kTRyxEYsp7KkkqhQ4Gbn2vXeNZXR+fs3wtntAU8o75wE985GmdED6ibzF TPg+g0MED4RZb5y8p0cRuHfjSM6ornearmPuYy4JkfExq7jpXqZQfxwAS4VdsihD AdDh/8GEE9u9LbwPNQBZ8GSTVpnw+SS8WrTvvEDdw/KRiteCP55XTx8hpMu+HYkF fKXrVADRkgXsWON4EYjoHO3Cm3aPU5VFcdiqL14HilmnbV/PcL6OjQs8IvZPjgrK j5ROTG1Ka/w+y3X7elDT661650E= =81iV END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-287 Improper Authentication

CPE : Common Platform Enumeration

Application 2
Os 748

Nessus® Vulnerability Scanner

Date Description
2017-10-06 Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20170927-cc.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
Date Informations
2017-10-07 13:25:06
  • Multiple Updates
2017-10-06 21:25:50
  • Multiple Updates
2017-09-29 09:26:02
  • Multiple Updates
2017-09-27 21:23:06
  • First insertion