Cisco Catalyst Center Static SSH Host Key (cisco-sa-dnac-ssh-e4uOdASj)

high Nessus Plugin ID 207806

Language:

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

The version of Cisco Catalyst Center (formerly Cisco DNA Center) installed on the remote host is prior to 2.3.5.6, 2.3.6.x, or 2.3.7.x prior to 2.3.7.5. It is, therefore, affected by a vulnerability in the SSH server that could allow an unauthenticated, remote attacker to impersonate a Cisco Catalyst Center appliance. This vulnerability is due to the presence of a static SSH host key. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections, which could allow the attacker to intercept traffic between SSH clients and a Cisco Catalyst Center appliance. A successful exploit could allow the attacker to impersonate the affected appliance, inject commands into the terminal session, and steal valid user credentials.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwi40467

See Also

http://www.nessus.org/u?831c0429

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwi40467

Plugin Details

Severity: High

ID: 207806

File Name: cisco-sa-dnac-ssh-e4uOdASj.nasl

Version: 1.1

Type: remote

Family: CISCO

Published: 9/26/2024

Updated: 9/26/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-20350

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:cisco:digital_network_architecture_center

Required KB Items: installed_sw/Cisco DNA Center

Patch Publication Date: 9/25/2024

Vulnerability Publication Date: 9/25/2024

Reference Information

CVE: CVE-2024-20350

CISCO-SA: cisco-sa-dnac-ssh-e4uOdASj

IAVA: 2024-A-0591

CISCO-BUG-ID: CSCwi40467