Cisco IOS XR OpenSSL Security Bypass (CSCup22654)

medium Nessus Plugin ID 88990

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The remote Cisco device is running a version of IOS XR software that is affected by security bypass vulnerability in the bundled OpenSSL library due to an unspecified error that can allow an attacker to cause the usage of weak keying material, leading to simplified man-in-the-middle attacks.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCup22654.

See Also

http://www.nessus.org/u?0aa6a7e6

https://tools.cisco.com/bugsearch/bug/CSCup22654

https://www.openssl.org/news/secadv/20140605.txt

https://www.openssl.org/news/vulnerabilities.html

https://www.imperialviolet.org/2014/06/05/earlyccs.html

Plugin Details

Severity: Medium

ID: 88990

File Name: cisco-sa-20140605-openssl-iosxr.nasl

Version: 1.12

Type: combined

Family: CISCO

Published: 2/26/2016

Updated: 4/8/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2014-0224

Vulnerability Information

CPE: cpe:/o:cisco:ios_xr

Required KB Items: Host/Cisco/IOS-XR/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/5/2014

Vulnerability Publication Date: 6/3/2014

Exploitable With

Core Impact

Reference Information

CVE: CVE-2014-0224

BID: 67899

CERT: 978508

CISCO-SA: cisco-sa-20140605-openssl

CISCO-BUG-ID: CSCup22654