ID

VAR-201104-0093


CVE

CVE-2011-0935


TITLE

Cisco IOS of PKI Vulnerabilities that bypass authentication in functions

Trust: 0.8

sources: JVNDB: JVNDB-2011-001601

DESCRIPTION

The PKI functionality in Cisco IOS 15.0 and 15.1 does not prevent permanent caching of certain public keys, which allows remote attackers to bypass authentication and have unspecified other impact by leveraging an IKE peer relationship in which a key was previously valid but later revoked, aka Bug ID CSCth82164, a different vulnerability than CVE-2010-4685. Cisco IOS of PKI Because the feature does not prevent the use of a persistent cache for a particular public key, there are vulnerabilities that are bypassed for authentication or otherwise unaffected. The problem is Bug ID CSCth82164 Is the problem of CVE-2010-4685 Is a different vulnerability.Keys that have been disabled from valid IKE Through peer relationships, authentication can be bypassed or other details can be affected. Cisco IOS is prone to a security-bypass vulnerability. Exploiting this issue can allow attackers to bypass certain security restrictions. Cisco IOS 15.0 and 15.1 are vulnerable. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment. ---------------------------------------------------------------------- http://secunia.com/research/ http://secunia.com/company/jobs/open_positions/reverse_engineer ---------------------------------------------------------------------- TITLE: Cisco IOS OCSP Revoked Certificate Security Issue SECUNIA ADVISORY ID: SA44363 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44363/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44363 RELEASE DATE: 2011-04-27 DISCUSS ADVISORY: http://secunia.com/advisories/44363/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/44363/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=44363 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A security issue has been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. The security issue is caused due to an error in the OCSP functionality and can lead to a revoked certificate being successfully authenticated. SOLUTION: Update to versions 15.1(1)S1 or 15.1(2)T2. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://www.cisco.com/en/US/docs/ios/15_1s/release/notes/15_1s_caveats_15_1_1s.html http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2011-0935 // JVNDB: JVNDB-2011-001601 // BID: 47407 // VULHUB: VHN-48880 // PACKETSTORM: 100865

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.1

Trust: 2.7

vendor:ciscomodel:iosscope:eqversion:15.0

Trust: 2.7

vendor:ciscomodel:ios 15.1 tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.1 sscope:neversion: -

Trust: 0.3

sources: BID: 47407 // JVNDB: JVNDB-2011-001601 // CNNVD: CNNVD-201104-150 // NVD: CVE-2011-0935

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-0935
value: HIGH

Trust: 1.0

NVD: CVE-2011-0935
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201104-150
value: CRITICAL

Trust: 0.6

VULHUB: VHN-48880
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-0935
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-48880
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-48880 // JVNDB: JVNDB-2011-001601 // CNNVD: CNNVD-201104-150 // NVD: CVE-2011-0935

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

sources: VULHUB: VHN-48880 // JVNDB: JVNDB-2011-001601 // NVD: CVE-2011-0935

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201104-150

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201104-150

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-001601

PATCH

title:15_1s_caveats_15_1_1surl:http://www.cisco.com/en/US/docs/ios/15_1s/release/notes/15_1s_caveats_15_1_1s.html

Trust: 0.8

title:151-2TCAVSurl:http://www.cisco.com/en/US/docs/ios/15_1/release/notes/151-2TCAVS.html

Trust: 0.8

sources: JVNDB: JVNDB-2011-001601

EXTERNAL IDS

db:NVDid:CVE-2011-0935

Trust: 2.8

db:BIDid:47407

Trust: 2.2

db:SECUNIAid:44363

Trust: 0.9

db:JVNDBid:JVNDB-2011-001601

Trust: 0.8

db:CNNVDid:CNNVD-201104-150

Trust: 0.7

db:NSFOCUSid:16731

Trust: 0.6

db:VULHUBid:VHN-48880

Trust: 0.1

db:PACKETSTORMid:100865

Trust: 0.1

sources: VULHUB: VHN-48880 // BID: 47407 // JVNDB: JVNDB-2011-001601 // PACKETSTORM: 100865 // CNNVD: CNNVD-201104-150 // NVD: CVE-2011-0935

REFERENCES

url:http://www.cisco.com/en/us/docs/ios/15_1/release/notes/151-2tcavs.html

Trust: 2.1

url:http://www.cisco.com/en/us/docs/ios/15_1s/release/notes/15_1s_caveats_15_1_1s.html

Trust: 2.1

url:http://www.securityfocus.com/bid/47407

Trust: 1.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0935

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0935

Trust: 0.8

url:http://secunia.com/advisories/44363

Trust: 0.8

url:http://www.nsfocus.net/vulndb/16731

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:http://secunia.com/research/

Trust: 0.1

url:http://secunia.com/advisories/44363/#comments

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/44363/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=44363

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/company/jobs/open_positions/reverse_engineer

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-48880 // BID: 47407 // JVNDB: JVNDB-2011-001601 // PACKETSTORM: 100865 // CNNVD: CNNVD-201104-150 // NVD: CVE-2011-0935

CREDITS

Cisco

Trust: 0.3

sources: BID: 47407

SOURCES

db:VULHUBid:VHN-48880
db:BIDid:47407
db:JVNDBid:JVNDB-2011-001601
db:PACKETSTORMid:100865
db:CNNVDid:CNNVD-201104-150
db:NVDid:CVE-2011-0935

LAST UPDATE DATE

2025-04-11T23:10:51.157000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-48880date:2011-04-21T00:00:00
db:BIDid:47407date:2011-04-18T00:00:00
db:JVNDBid:JVNDB-2011-001601date:2011-05-19T00:00:00
db:CNNVDid:CNNVD-201104-150date:2011-04-15T00:00:00
db:NVDid:CVE-2011-0935date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-48880date:2011-04-14T00:00:00
db:BIDid:47407date:2011-04-18T00:00:00
db:JVNDBid:JVNDB-2011-001601date:2011-05-19T00:00:00
db:PACKETSTORMid:100865date:2011-04-27T11:51:09
db:CNNVDid:CNNVD-201104-150date:2011-04-15T00:00:00
db:NVDid:CVE-2011-0935date:2011-04-14T16:55:01.317