Cisco NX-OS DHCP POAP Command Injection Vulnerability

high Nessus Plugin ID 83087

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The remote Cisco device is running a version of NX-OS software that is affected by a command injection vulnerability due to the PowerOn Auto Provisioning (POAP) feature not properly validating the DHCP options returned by POAP. An attacker on an adjacent network, using crafted DHCP packets, can execute arbitrary commands as the root user in response to the initial DHCP request made by the device during the POAP process.

Solution

Apply the appropriate patch referenced in Cisco bug ID CSCur14589 or CSCuu06246.

See Also

http://www.nessus.org/u?1f497563

Plugin Details

Severity: High

ID: 83087

File Name: cisco-CSCur14589-nxos.nasl

Version: 1.6

Type: combined

Family: CISCO

Published: 4/27/2015

Updated: 10/29/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.9

Temporal Score: 5.8

Vector: CVSS2#AV:A/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Host/Cisco/NX-OS/Version, Host/Cisco/NX-OS/Device, Host/Cisco/NX-OS/Model

Exploit Ease: No known exploits are available

Patch Publication Date: 4/20/2015

Vulnerability Publication Date: 3/27/2015

Reference Information

CVE: CVE-2015-0658

BID: 73390

CISCO-BUG-ID: CSCur14589, CSCuu06246