QID 317189
Date Published: 2022-05-23
QID 317189: Cisco Internetwork Operating System (IOS) XR Software Health Check Open Port Vulnerability (cisco-sa-iosxr-redis-ABJyE5xK)
A vulnerability in the health check RPM of Cisco IOS XR Software could allow an unauthenticated, remote attacker to access the Redis instance that is running within the NOSi container.
Affected Products
Cisco devices if they are running Cisco IOS XR Software version 7.3.3
QID Detection Logic (Authenticated):
The check matches Cisco IOS XR version retrieved via Unix Auth using "show version" command, along with a check for docker container with the name NOSi and check for Cisco SMU CSCwb82689
Note: This QID is not checking for the workaround
A successful exploit could allow the attacker to write to the Redis in-memory database, write arbitrary files to the container filesystem, and retrieve information about the Redis database. Given the configuration of the sandboxed container that the Redis instance runs in, a remote attacker would be unable to execute remote code or abuse the integrity of the Cisco IOS XR Software host system.
Customers are advised to refer to cisco-sa-iosxr-redis-ABJyE5xK for more information.Workaround:
There are workarounds that address this vulnerability:
Customers are advised to refer to cisco-sa-iosxr-redis-ABJyE5xK for workaround related information
- cisco-sa-iosxr-redis-ABJyE5xK -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-redis-ABJyE5xK
CVEs related to QID 317189
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-iosxr-redis-ABJyE5xK |
|