
The best possible mitigation is suggested to be the change of configuration settings. It is possible to mitigate the problem by applying the configuration setting no vstack.Proper firewalling of tcp/4786 is able to address this issue.
NO VSTACK CISCO ROUTER INSTALL
Print(' Sending TCP probe to '.format(args.ip, args.port))Ĭonn.send(req.decode('hex')) The advisory illustrates:Ĭisco does not consider this a vulnerability in Cisco IOS, IOS XE, or the Smart Install feature itself but a misuse of the Smart Install protocol, which does not require authentication by design. As 0-day the estimated underground price was around $25k-$100k. It is possible to download the exploit at. This could leave the involved devices susceptible to misuse of the feature.Ī public exploit has been developed in Python. The advisory points out:Ĭisco is aware of a significant increase in Internet scans attempting to detect devices where, after completing setup, the Smart Install feature remains enabled and without proper security controls. This vulnerability has a historic impact due to its background and reception. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment ( estimation calculated on ). Technical details are unknown but a public exploit is available. No form of authentication is required for a successful exploitation. Several researchers have reported on the use of Smart Install (SMI) protocol messages toward Smart Install clients, also known as integrated branch clients (IBC), allowing an unauthenticated, remote attacker to change the startup-config file and force a reload of the device, load a new IOS image on the device, and execute high-privilege CLI commands on switches running Cisco IOS and IOS XE Software.The attack can be initiated remotely.

The public release was coordinated with the vendor. The weakness was released as cisco-sr-20170214-smi as confirmed security response (Website). As an impact it is known to affect confidentiality, integrity, and availability.
NO VSTACK CISCO ROUTER SOFTWARE
When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct. The CWE definition for the vulnerability is CWE-287. The manipulation with an unknown input leads to a weak authentication vulnerability.

NO VSTACK CISCO ROUTER CODE
This vulnerability affects an unknown code of the component Smart Install. A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability has been found in Cisco IOS and IOS XE ( Router Operating System) ( the affected version is unknown) and classified as very critical. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.
