Synopsis
The remote VxWorks device is potentially affected by several vulnerabilities.
Description
According to its self-reported version, the remote VxWorks device is version 5.5 through 6.9. It therefore is potentially affected by the following vulnerabilities :
- An attacker can cause SSH access to be unavailable until the next reboot with a specially crafted requests. (CVE-2013-0711 / CVE-2013-0712 / CVE-2013-0713)
- An attacker can cause the server to hang and SSH access to be unavailable until the next reboot by sending a specially crafted packet for a public key authentication request. Arbitrary code execution is also a possibility. (CVE-2013-0714)
- An attacker able to login to a CLI session can cause the current CLI session to crash. (CVE-2013-0715)
- An attacker able to access the VxWorks Web Server can cause the server to crash using a specially crafted URL. (CVE-2013-0716)
Note that the Web Server and CLI vulnerabilities affect VxWorks 5.5 through 6.9 while the SSH vulnerabilities affect only versions 6.5 through 6.9.
Note that Nessus has not checked for the presence of the patch so this finding may be a false positive.
Solution
Contact the device vendor for the appropriate patch.
Plugin Details
File Name: vxworks_ipssh_and_www_multi_dos.nasl
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Vulnerability Information
Required KB Items: Settings/ParanoidReport, Host/OS
Exploit Ease: No known exploits are available
Patch Publication Date: 3/18/2013
Vulnerability Publication Date: 3/18/2013
Reference Information
CVE: CVE-2013-0711, CVE-2013-0712, CVE-2013-0713, CVE-2013-0714, CVE-2013-0715, CVE-2013-0716
BID: 58638, 58539, 58640, 58641, 58642, 58643