Skip to content

Commit 2737cdd

Browse files
cisco_ios 2023 cve
1 parent aad7726 commit 2737cdd

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

CVEasy/Cisco/2023/cisco_ios/cve202320081.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,6 @@ def rule_cve202320081(configuration, commands, device, devices):
2929
f"Device {device.name} is vulnerable to CVE-2023-20081. "
3030
"The device has DHCPv6 client configured, "
3131
"which could allow an attacker to cause a denial of service through crafted DHCPv6 messages. "
32-
"For more information,see"
33-
"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftdios-dhcpv6-cli-Zf3zTv"
32+
"For more information,see https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-"
33+
"sa-asaftdios-dhcpv6-cli-Zf3zTv"
3434
)

CVEasy/Cisco/2023/cisco_ios/cve202320109.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@
1212
def rule_cve202320109(configuration, commands, device, devices):
1313
"""
1414
This rule checks for the CVE-2023-20109 vulnerability in Cisco IOS Software.
15-
The vulnerability is due to insufficient validation of attributes in the Group Domain of
16-
Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could
17-
exploit this vulnerability by either compromising an installed key server or modifying
15+
The vulnerability is due to insufficient validation of attributes in the Group Domain of
16+
Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could
17+
exploit this vulnerability by either compromising an installed key server or modifying
1818
the configuration of a group member to point to a key server that is controlled by the attacker.
1919
"""
2020
# Extract the output of the command to check GET VPN configuration

CVEasy/Cisco/2023/cisco_ios/cve202320186.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,8 @@ def rule_cve202320186(configuration, commands, device, devices):
1313
"""
1414
This rule checks for the CVE-2023-20186 vulnerability in Cisco IOS Software.
1515
The vulnerability is due to incorrect processing of SCP commands in AAA command authorization checks.
16-
An attacker with valid credentials and level 15 privileges could exploit this vulnerability by using
17-
SCP to connect to an affected device from an external machine, potentially allowing them to obtain
16+
An attacker with valid credentials and level 15 privileges could exploit this vulnerability by using
17+
SCP to connect to an affected device from an external machine, potentially allowing them to obtain
1818
or change the configuration of the affected device.
1919
"""
2020
# Extract the version information from the command output

0 commit comments

Comments
 (0)