CORE-RTR-01 | Cisco IOS Router | 15.7(3)M5
Generated: 2024-12-02T14:32:18
A vulnerability in the web UI feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to create an account...
Device Version: 15.7(3)M5 | Fixed in: 17.9.4a, 17.6.6a, 17.3.8a
A vulnerability in the Cisco Group Encrypted Transport VPN feature could allow an authenticated attacker to execute arbitrary code...
Device Version: 15.7(3)M5 | Fixed in: 15.9(3)M7, 16.12.10a
A vulnerability in the web-based management interface could allow an authenticated remote attacker to obtain sensitive information...
Device Version: 15.7(3)M5 | Fixed in: 17.6.5, 17.9.3
| Control ID | Title | Level | Severity | Status |
|---|---|---|---|---|
| 1.1.1 | Enable Secret Password | Level 1 | CRITICAL | PASS |
| 1.1.2 | Service Password Encryption | Level 1 | HIGH | PASS |
| 1.2.1 | SSH Timeout Configuration | Level 1 | MEDIUM | FAIL |
| 1.2.2 | SSH Version 2 | Level 1 | HIGH | PASS |
| 2.1.1 | Disable Telnet | Level 1 | CRITICAL | FAIL |
| 2.1.2 | VTY Access Class | Level 1 | HIGH | FAIL |
| 2.2.1 | SNMP Community Strings | Level 1 | CRITICAL | PASS |
| 3.1.1 | NTP Authentication | Level 2 | MEDIUM | FAIL |
| 3.2.1 | Logging Buffer Size | Level 2 | LOW | PASS |
| 3.2.2 | Syslog Server Configuration | Level 2 | MEDIUM | PASS |
| Type | Location | Severity | Issue | Recommendation |
|---|---|---|---|---|
| Type 7 | Line 45 | CRITICAL | Reversible password encryption (easily decoded) | Use Type 8 or Type 9 encryption |
| Type 5 | Line 23 | MEDIUM | MD5-based encryption (considered weak) | Upgrade to Type 8 (PBKDF2) or Type 9 (scrypt) |
| Type 0 | Line 112 | CRITICAL | Cleartext password detected | Enable service password-encryption immediately |
| ACL Name | Finding Type | Risk | Issue | Recommendation |
|---|---|---|---|---|
| OUTSIDE-IN | any-any-permit | CRITICAL | Permit any any rule allows all traffic | Replace with specific permit rules |
| MGMT-ACCESS | shadowed-rule | MEDIUM | Rule on line 15 is shadowed by rule on line 8 | Review and reorder ACL entries |
| DMZ-OUT | excessive-permit | HIGH | Overly permissive rule permits entire /8 network | Restrict to specific subnets |
SSH session timeout not configured - sessions may remain open indefinitely
Telnet is enabled on VTY lines - unencrypted management access
No access-class configured on VTY lines - management access from any IP
NTP authentication not enabled - vulnerable to time spoofing attacks