QID 317189

Date Published: 2022-05-23

QID 317189: Cisco Internetwork Operating System (IOS) XR Software Health Check Open Port Vulnerability (cisco-sa-iosxr-redis-ABJyE5xK)

A vulnerability in the health check RPM of Cisco IOS XR Software could allow an unauthenticated, remote attacker to access the Redis instance that is running within the NOSi container.

Affected Products
Cisco devices if they are running Cisco IOS XR Software version 7.3.3

QID Detection Logic (Authenticated):
The check matches Cisco IOS XR version retrieved via Unix Auth using "show version" command, along with a check for docker container with the name NOSi and check for Cisco SMU CSCwb82689
Note: This QID is not checking for the workaround

A successful exploit could allow the attacker to write to the Redis in-memory database, write arbitrary files to the container filesystem, and retrieve information about the Redis database. Given the configuration of the sandboxed container that the Redis instance runs in, a remote attacker would be unable to execute remote code or abuse the integrity of the Cisco IOS XR Software host system.

  • CVSS V3 rated as High - 6.5 severity.
  • CVSS V2 rated as High - 6.4 severity.
  • Solution

    Customers are advised to refer to cisco-sa-iosxr-redis-ABJyE5xK for more information.Workaround:
    There are workarounds that address this vulnerability:

    Customers are advised to refer to cisco-sa-iosxr-redis-ABJyE5xK for workaround related information

    CVEs related to QID 317189

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-iosxr-redis-ABJyE5xK URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-redis-ABJyE5xK