UCloud-201804-001:思科Smart Install的远程代码
思科 IOS 和 IOS-XE 系统 Smart Install Client 代码中存在一个缓冲区堆栈溢出漏洞(CVE-2018-0171)。攻击者可以远程向 TCP 4786 端口发送一个恶意数据包,触发目标设备的栈溢出漏洞,造成设备拒绝服务(DoS)或在造成远程命令执行,攻击者可以远程控制受到漏洞影响的网络设备。
据悉,思科交换器 TCP 4786 端口是默认开放的,相关PoC已经被发布。Smart Install 功能是部署交换机的即插即用配置和镜像管理功能。它自动完成初始化,并为新的网络交换器加载当前操作系统的镜像。
影响设备主要涉及:
● Catalyst 4500 Supervisor Engines
● Cisco Catalyst 3850 Series Switches
● Cisco Catalyst 2960 Series Switches
● Cisco Catalyst 4500 SupervisorEngine 6L-E
●Cisco IOS 15.2.2E6 (Latest,Suggested)
●cat4500e-entservicesk9-mz.152-2.E6.bin(23-DEC-2016)
●Cisco Catalyst 2960-48TT-L Switch
●Cisco IOS 12.2(55)SE11 (Suggested)
●c2960-lanbasek9-mz.122-55.SE11.bin(18-AUG-2016)
●Cisco IOS 15.0.2-SE10a (Latest)
●c2960-lanbasek9-mz.150-2.SE10a.bin(10-NOV-2016)
●Cisco Catalyst 3850-24P-E Switch
●Cisco IOS-XE 03.03.05.SE
●cat3k_caa-universalk9.SPA.03.03.05.SE.150-1.EZ5.bin(03-NOV-2014)
部分包含Smart Install Client的设备也可能受到影响:
● Catalyst 4500 Supervisor Engines
● Catalyst 3850 Series
● Catalyst 3750 Series
● Catalyst 3650 Series
● Catalyst 3560 Series
● Catalyst 2960 Series
● Catalyst 2975 Series
● IE 2000
● IE 3000
● IE 3010
● IE 4000
● IE 4010
● IE 5000
● SM-ES2 SKUs
● SM-ES3 SKUs
● NME-16ES-1G-P
● SM-X-ES3 SKUs
1、确认目标设备是否开启4786/TCP端口:
nmap -p T:4786 IP或IP段
2、执行命令show vstack config,确认是否开启 Smart Install Client 功能
switch1# show vstack config
Role: Client (SmartInstall enabled)
1.思科已发布免费软件更新来解决该漏洞,请升级到官方发布的修复版本
2.关闭Smart Install特性和相应的TCP端口:
Smart Install 关闭方法:
Director(config)# no vstack
Director(config)#
并确认是否关闭成功: show vstack status
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2
https://www.seebug.org/vuldb/ssvid-97206