BDU:2019-02726
Vulnerability from fstec - Published: 26.09.2018
VLAI Severity ?
Title
Уязвимость реализации протокола Precision Time Protocol (PTP) операционной системы Cisco IOS, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость реализации протокола Precision Time Protocol (PTP) операционной системы Cisco IOS связана с ошибками обработки PTP пакетов. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, вызвать отказ в обслуживании путем отправки специально сформированных PTP-пакетов
Severity ?
Vendor
Cisco Systems Inc.
Software Name
Cisco IOS
Software Version
15.2(2)E5b (Cisco IOS), 15.2(5a)E1 (Cisco IOS), 12.2(55)SE (Cisco IOS), 12.2(55)SE3 (Cisco IOS), 12.2(58)SE (Cisco IOS), 12.2(58)SE1 (Cisco IOS), 12.2(55)SE4 (Cisco IOS), 12.2(58)SE2 (Cisco IOS), 12.2(55)SE5 (Cisco IOS), 12.2(55)SE6 (Cisco IOS), 12.2(55)SE7 (Cisco IOS), 12.2(55)SE9 (Cisco IOS), 12.2(55)SE10 (Cisco IOS), 12.2(55)SE11 (Cisco IOS), 12.2(55)SE12 (Cisco IOS), 15.0(1)EY (Cisco IOS), 15.0(1)EY2 (Cisco IOS), 15.0(2)EY (Cisco IOS), 15.0(2)EY1 (Cisco IOS), 15.0(2)EY2 (Cisco IOS), 15.0(2)EY3 (Cisco IOS), 15.0(2)SE (Cisco IOS), 15.0(2)SE1 (Cisco IOS), 15.0(2)SE2 (Cisco IOS), 15.0(2)SE3 (Cisco IOS), 15.0(2)SE4 (Cisco IOS), 15.0(2)SE5 (Cisco IOS), 15.0(2)SE6 (Cisco IOS), 15.0(2)SE7 (Cisco IOS), 15.0(2)SE8 (Cisco IOS), 15.0(2)SE9 (Cisco IOS), 15.0(2)SE10 (Cisco IOS), 15.0(2)SE11 (Cisco IOS), 15.0(2)SE10a (Cisco IOS), 15.2(2)E (Cisco IOS), 15.2(2)E1 (Cisco IOS), 15.2(3)E1 (Cisco IOS), 15.2(2)E2 (Cisco IOS), 15.2(2)E3 (Cisco IOS), 15.2(3)E2 (Cisco IOS), 15.2(3)E3 (Cisco IOS), 15.2(2)E4 (Cisco IOS), 15.2(2)E5 (Cisco IOS), 15.2(3)E4 (Cisco IOS), 15.2(5)E (Cisco IOS), 15.2(2)E6 (Cisco IOS), 15.2(5)E1 (Cisco IOS), 15.2(2)E5a (Cisco IOS), 15.2(3)E5 (Cisco IOS), 15.2(2)E7 (Cisco IOS), 15.2(5)E2 (Cisco IOS), 15.2(6)E (Cisco IOS), 15.2(5)E2b (Cisco IOS), 15.2(5)E2c (Cisco IOS), 15.2(6)E0a (Cisco IOS), 15.2(2)E7b (Cisco IOS), 15.2(6)E0c (Cisco IOS), 15.2(1)EY (Cisco IOS), 15.0(2)EK (Cisco IOS), 15.0(2)EK1 (Cisco IOS), 15.2(2)EB (Cisco IOS), 15.2(2)EB1 (Cisco IOS), 15.2(2)EB2 (Cisco IOS), 15.2(4)EC1 (Cisco IOS), 15.2(4)EC2 (Cisco IOS), 15.0(2)EX2 (Cisco IOS), 15.0(2)EX8 (Cisco IOS), 15.2(2b)E (Cisco IOS), 15.2(3)EA1 (Cisco IOS), 15.2(4a)EA5 (Cisco IOS), 12.2(46)SE2 (Cisco IOS), 12.2(50)SE2 (Cisco IOS), 12.2(50)SE1 (Cisco IOS), 12.2(50)SE5 (Cisco IOS), 12.2(52)SE (Cisco IOS), 12.2(50)SE3 (Cisco IOS), 12.2(52)SE1 (Cisco IOS), 12.2(46)SE1 (Cisco IOS), 12.2(50)SE4 (Cisco IOS), 12.2(50)SE (Cisco IOS), 12.2(53)EZ (Cisco IOS), 15.2(2)E8 (Cisco IOS), 15.2(4s)E2 (Cisco IOS), 15.2(2)EA2 (Cisco IOS), 15.2(3)EA (Cisco IOS), 15.2(4)EA (Cisco IOS), 15.2(4)EA1 (Cisco IOS), 15.2(2)EA3 (Cisco IOS), 15.2(4)EA3 (Cisco IOS), 15.2(5)EA (Cisco IOS), 15.2(4)EA4 (Cisco IOS), 15.2(4)EA2 (Cisco IOS), 15.2(4)EA5 (Cisco IOS), 12.2(60)EZ16 (Cisco IOS), 15.0(2)SG11a (Cisco IOS), 15.2(2)EA (Cisco IOS)
Possible Mitigations
Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ptp
Reference
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ptp
CWE
CWE-399
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "15.2(2)E5b (Cisco IOS), 15.2(5a)E1 (Cisco IOS), 12.2(55)SE (Cisco IOS), 12.2(55)SE3 (Cisco IOS), 12.2(58)SE (Cisco IOS), 12.2(58)SE1 (Cisco IOS), 12.2(55)SE4 (Cisco IOS), 12.2(58)SE2 (Cisco IOS), 12.2(55)SE5 (Cisco IOS), 12.2(55)SE6 (Cisco IOS), 12.2(55)SE7 (Cisco IOS), 12.2(55)SE9 (Cisco IOS), 12.2(55)SE10 (Cisco IOS), 12.2(55)SE11 (Cisco IOS), 12.2(55)SE12 (Cisco IOS), 15.0(1)EY (Cisco IOS), 15.0(1)EY2 (Cisco IOS), 15.0(2)EY (Cisco IOS), 15.0(2)EY1 (Cisco IOS), 15.0(2)EY2 (Cisco IOS), 15.0(2)EY3 (Cisco IOS), 15.0(2)SE (Cisco IOS), 15.0(2)SE1 (Cisco IOS), 15.0(2)SE2 (Cisco IOS), 15.0(2)SE3 (Cisco IOS), 15.0(2)SE4 (Cisco IOS), 15.0(2)SE5 (Cisco IOS), 15.0(2)SE6 (Cisco IOS), 15.0(2)SE7 (Cisco IOS), 15.0(2)SE8 (Cisco IOS), 15.0(2)SE9 (Cisco IOS), 15.0(2)SE10 (Cisco IOS), 15.0(2)SE11 (Cisco IOS), 15.0(2)SE10a (Cisco IOS), 15.2(2)E (Cisco IOS), 15.2(2)E1 (Cisco IOS), 15.2(3)E1 (Cisco IOS), 15.2(2)E2 (Cisco IOS), 15.2(2)E3 (Cisco IOS), 15.2(3)E2 (Cisco IOS), 15.2(3)E3 (Cisco IOS), 15.2(2)E4 (Cisco IOS), 15.2(2)E5 (Cisco IOS), 15.2(3)E4 (Cisco IOS), 15.2(5)E (Cisco IOS), 15.2(2)E6 (Cisco IOS), 15.2(5)E1 (Cisco IOS), 15.2(2)E5a (Cisco IOS), 15.2(3)E5 (Cisco IOS), 15.2(2)E7 (Cisco IOS), 15.2(5)E2 (Cisco IOS), 15.2(6)E (Cisco IOS), 15.2(5)E2b (Cisco IOS), 15.2(5)E2c (Cisco IOS), 15.2(6)E0a (Cisco IOS), 15.2(2)E7b (Cisco IOS), 15.2(6)E0c (Cisco IOS), 15.2(1)EY (Cisco IOS), 15.0(2)EK (Cisco IOS), 15.0(2)EK1 (Cisco IOS), 15.2(2)EB (Cisco IOS), 15.2(2)EB1 (Cisco IOS), 15.2(2)EB2 (Cisco IOS), 15.2(4)EC1 (Cisco IOS), 15.2(4)EC2 (Cisco IOS), 15.0(2)EX2 (Cisco IOS), 15.0(2)EX8 (Cisco IOS), 15.2(2b)E (Cisco IOS), 15.2(3)EA1 (Cisco IOS), 15.2(4a)EA5 (Cisco IOS), 12.2(46)SE2 (Cisco IOS), 12.2(50)SE2 (Cisco IOS), 12.2(50)SE1 (Cisco IOS), 12.2(50)SE5 (Cisco IOS), 12.2(52)SE (Cisco IOS), 12.2(50)SE3 (Cisco IOS), 12.2(52)SE1 (Cisco IOS), 12.2(46)SE1 (Cisco IOS), 12.2(50)SE4 (Cisco IOS), 12.2(50)SE (Cisco IOS), 12.2(53)EZ (Cisco IOS), 15.2(2)E8 (Cisco IOS), 15.2(4s)E2 (Cisco IOS), 15.2(2)EA2 (Cisco IOS), 15.2(3)EA (Cisco IOS), 15.2(4)EA (Cisco IOS), 15.2(4)EA1 (Cisco IOS), 15.2(2)EA3 (Cisco IOS), 15.2(4)EA3 (Cisco IOS), 15.2(5)EA (Cisco IOS), 15.2(4)EA4 (Cisco IOS), 15.2(4)EA2 (Cisco IOS), 15.2(4)EA5 (Cisco IOS), 12.2(60)EZ16 (Cisco IOS), 15.0(2)SG11a (Cisco IOS), 15.2(2)EA (Cisco IOS)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ptp",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "26.09.2018",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "30.07.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-02726",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2018-0473",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Cisco IOS",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Cisco Systems Inc. - - Cisco 2500 Series Connected Grid Switches, Cisco Systems Inc. - - Cisco Connected Grid Ethernet Switch Module Interface Card, Cisco Systems Inc. - - Cisco Industrial Ethernet 2000 Series Switches, Cisco Systems Inc. - - Cisco Industrial Ethernet 3000 Series Switches, Cisco Systems Inc. - - Cisco Industrial Ethernet 3010 Series Switches, Cisco Systems Inc. - - Cisco Industrial Ethernet 4000 Series Switches, Cisco Systems Inc. - - Cisco Industrial Ethernet 4010 Series Switches, Cisco Systems Inc. - - Cisco Industrial Ethernet 5000 Series Switches",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 Precision Time Protocol (PTP) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Cisco IOS, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041e\u0448\u0438\u0431\u043a\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u043c (CWE-399)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 Precision Time Protocol (PTP) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Cisco IOS \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 PTP \u043f\u0430\u043a\u0435\u0442\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 PTP-\u043f\u0430\u043a\u0435\u0442\u043e\u0432",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ptp",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-399",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,6)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…