cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1437
Views
25
Helpful
4
Replies

CSCvn93524 - Cisco REST API Container for IOS XE Software Authentication Bypass Vulnerability

MaxFisher925
Level 1
Level 1

We have two 4351 ISRs that were running Everest 16.6.5 IOS that a security scan showed had this vulnerability even without the REST API being installed and activated.  We upgraded to the referenced fixed IOS 16.6.6 however our scans still show this vulnerability active.  Any thoughts?

1 Accepted Solution

Accepted Solutions

If you can't even enter the command then it means that you're not going to be impacted.

View solution in original post

4 Replies 4

Leo Laohoo
Hall of Fame
Hall of Fame
Can you post the output to the command "show virtual-service detail | include Restful"?

We never installed/configured the REST API so the command isn't available.  However Nessus is still being triggered on this vulnerability.  Unfortunately Nessus doesn't show an output for what criteria is matching for this vulnerability.  It even shows the IOS version 16.6.6 which in the Bug Report is listed as a fixed version.

 

XXXXXXX#show v?
vasi version vlan vlan-autoconfig
vlan-range vlans vmi vnet
vpdn vrf vrrp vrrs
vtemplate vtp

XXXXXXX#show vir?
% Unrecognized command

If you can't even enter the command then it means that you're not going to be impacted.

That's what I was hoping.