漏洞分享 - 思科產品存在多個漏洞
思科產品存在多個漏洞
一、摘要
思科產品存在多個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發提權、命令注入、阻斷服務狀況及遠端執行任意程式碼。
二、存在風險
思科產品存在多個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發提權、命令注入、阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下:
- 受影響之系統/漏洞描述:
- Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Fragmentation Denial of Service Vulnerabilities
- CVE編號:CVE-2024-20307、CVE-2024-20308
- 漏洞描述:Cisco IOS 和 Cisco IOS XE的 Internet Key Exchange version 1 (IKEv1) fragmentation功能存在多個漏洞,允許未經授權之遠端攻擊者在易受影響系統上引起緩衝區溢位或損壞。
- 影響系統/版本:有啟用IKEv1 fragmentation 和 Any type of VPN that is based on IKEv1的Cisco IOS 和 Cisco IOS XE的設備。
- 檢查:show running-config | include crypto isakmp fragmentation
- Cisco IOS and IOS XE Software Locator ID Separation Protocol Denial of Service Vulnerability
- CVE編號:CVE-2024-20311
- 漏洞描述:Cisco IOS 和 Cisco IOS XE 的 Locator ID Separation Protocol (LISP)功能存在漏洞,允許未經授權之遠端攻擊者透過傳送精心製作的LISP封包到易受影響系統上,導致系統重啟。
- 影響系統/版本:有啟用LISP功能的Cisco IOS or IOS XE設備。
- 檢查:show running-config | include router lisp
- Cisco IOS XE Software DHCP Snooping with Endpoint Analytics Denial of Service Vulnerability
- CVE編號:CVE-2024-20259
- 漏洞描述:Cisco IOS XE 的DHCP snooping功能存在漏洞,允許未經授權之遠端攻擊者透過傳送精心製作的DHCP請求至易受影響的系統,導致系統重啟。
- 影響系統/版本:啟用DHCP snooping和endpoint analytics功能的Cisco IOS XE設備。
- 檢查:show running-config | include dhcp snooping vlan
- Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability
- CVE編號:CVE-2024-20314
- 漏洞描述:Cisco IOS XE 的IPv4 Software-Defined Access (SD-Access) fabric edge node功能存在漏洞,允許未經授權之遠端攻擊者透過傳送精心製作的IPv4封包,導致易受影響之系統耗盡CPU資源或程序停止。
- 影響系統/版本:有運行SD-Access fabric edge node的Cisco IOS XE設備。
- 檢查:Provision > SD Access > Fabric Sites
- Cisco IOS and IOS XE Software Intermediate System-to-Intermediate System Denial of Service Vulnerability
- CVE編號:CVE-2024-20312
- 漏洞描述:Cisco IOS 和 Cisco IOS XE的 System-to-Intermediate System (IS-IS)協議存在漏洞,允許未經授權之攻擊者透過傳送精心製作的IS-IS封包,導致易受影響之系統重啟。
- 影響系統/版本:有運行IS-IS路由協議(Level 1 或 Level 1-2)的Cisco IOS 和 Cisco IOS XE設備。
- 檢查:show running-config | section router isis
- Cisco IOS Software for Catalyst 6000 Series Switches Denial of Service Vulnerability
- CVE編號:CVE-2024-20276
- 漏洞描述:Cisco Catalyst 6000系列設備存在漏洞,允許未經授權之攻擊者透過傳送精心製作的流量,導致易受影響之系統重啟。
- 影響系統/版本:有啟用port security 或 device classifier的設備
- Catalyst 6500 Series Switches with Supervisor Engine 2T or 6T
- Catalyst 6800 Series Switches with Supervisor Engine 2T or 6T
- 檢查:
- show running-config | include interface|port-security
- show running-config | include device classifier
- Cisco IOS XE Software OSPFv2 Denial of Service Vulnerability
- CVE編號:CVE-2024-20313
- 漏洞描述:Cisco IOS XE的OSPF version 2 (OSPFv2)功能存在漏洞,允許未經授權之攻擊者透過傳送怪異的OSPF更新封包,導致易受影響之系統重啟。
- 影響系統/版本:有啟用OSPF協議之distribute link-state的Cisco IOS XE設備。
- 檢查:show running-config | include ospf|distribute link-state
- Cisco IOS XE Software for Wireless LAN Controllers Multicast DNS Denial of Service Vulnerability
- CVE編號:CVE-2024-20303
- 漏洞描述:Wireless LAN Controllers (WLCs)的多播DNS (mDNS) 閘道功能存在漏洞,允許未經授權之攻擊者透過傳送一連串精心製作的mDNS封包,導致易受影響之系統CPU使用率超標並且近一步導致APs與Controller失聯。
- 影響系統/版本:有啟用mDNS gateway功能且在FlexConnect模式下的APs設備。
- Catalyst 9800-CL Wireless Controllers for Cloud
- Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches
- Catalyst 9800 Series Wireless Controllers
- Embedded Wireless Controller on Catalyst APs
- 檢查:
- show ap status | i Flex
- show mdns-sd summary
- Cisco IOS XE Software for Wireless LAN Controllers Privilege Escalation Vulnerability
- CVE漏洞:CVE-2024-20324
- 漏洞描述:Wireless LAN Controllers的CLI存在漏洞,允許已取得低權限的攻擊者取得配置檔案或是密碼。
- 影響系統/版本:管理WLC的所有Cisco IOS XE版本。
- Cisco IOS XE Software Auxiliary Asynchronous Port Denial of Service Vulnerability
- CVE編號:CVE-2024-20309
- 漏洞描述:Cisco IOS XE的auxiliary asynchronous port (AUX) 功能存在漏洞,允許已取得授權之攻擊者,透過傳送特別的封包,導致易受影響系統重置或停止回應。
- 影響系統/版本:
- The device has an AUX port.
- The AUX port is configured with flowcontrol hardware.
- There is no hardware attached to the AUX port or the attached modem has signaled for flow control to be off and does not turn it on again.
- 檢查:show running-config | section line aux 0
- Cisco IOS XE Software NETCONF/RESTCONF IPv4 Access Control List Bypass Vulnerability
- CVE編號:CVE-2024-20316
- 漏洞描述:Cisco IOS XE的data model interface (DMI)服務存在漏洞,允許未經授權之遠端攻擊者使用NETCONF或RESTCONF協議更新IPv4 ACL。
- 影響系統/版本:有啟用 NETCONF或RESTCONF的Cisco IOS XE設備。
- IPv4 standard ACLs
- IPv4 extended ACLs when they include ACEs with the log or log-input option
- 透過下方檢查指令,如有顯示netconf-yang/restconf,表示NETCONF/RESTCONF功能是啟用狀態
- 檢查:
- show running-config | include netconf-yang
- show running-config | include restconf
- Cisco IOS XE Software Unified Threat Defense Command Injection Vulnerability
- CVE編號:CVE-2024-20306
- 漏洞描述:Cisco IOS XE的Unified Threat Defense (UTD) configuration CLI存在漏洞,允許已取得授權之攻擊者妤易受影響之系統任意執行代碼。
- 影響系統/版本:支援utd engine standard unified-policy配置的Cisco IOS XE設備。
- Cisco IOS XE Software Privilege Escalation Vulnerability
- CVE編號:CVE-2024-20278
- 漏洞描述:Cisco IOS XE的NETCONF功能存在漏洞,允許已取得授權之遠端攻擊者透過NETCONF輸入精心製作的內容至易受影響之系統,進而導致取得最高權限。
- 影響系統/版本:有啟用NETCONF的Cisco IOS XE設備
- 透過下方檢查指令,如有顯示netconf-yang,表示NETCONF功能是啟用狀態
- 檢查:show running-config | include netconf-yang
三、建議改善措施:
企業及使用者如有上述漏洞版本應盡速更新。
情資報告連結:
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-lisp-3gYXs3qP
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dhcp-dos-T3CXPO9z
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sda-edge-dos-qZWuWXWG
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-sGjyOUHX
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dos-Hq4d3tZG
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ospf-dos-dR9Sfrxp
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-mdns-dos-4hv6pBGf
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-privesc-RjSMrmPK
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aux-333WBz8f
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dmi-acl-bypass-Xv8FO8Vz
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-utd-cmd-JbL8KvHT
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX