cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
575
Views
0
Helpful
2
Replies

Determining Vulnerable Devices

ezuser666
Level 1
Level 1

Evening All,

I've been given nice belated xmas present  from my vulnerability management team asking me to advise which of our devices are vulnerable to the latest 30 advisories released by Cisco (and others). 

Let me set the scene, the network we are responsibile for has approximately 15000 Cisco devices being a mixture of IOS, XR, XE, NX-OS and ASA devices.  We don't have any vulnerability scanners so I'm reliant on the information given by our NMS which gives me Vendor, System OID, SNMP description, Software Version also(where known) device type.

I've tried doing some of the reviews manually but it takes way too much time. Experiments with the Cisco OpenVuln API have also proved fruitless as the data given by that appears to very inconsistent, something not even mapping to the same list of devices shown on the website. The Cisco software checker also (AFAIK) only works for IOS versions, not other devices such as the ASA firewalls.

Anyone else have this issue where your not permitted to run active scans on the network to look for these things and/or run automated configuration audits?

I'm still fighting the case for something like Nessus or Nexpose but so far the conversation is falling on deaf ears. Even a free solution like openVAS isn't being well received.

Any suggestions would be very much appreciated.

Thanks in advance

2 Replies 2

Leo Laohoo
Hall of Fame
Hall of Fame

There are a few methods around this madness.  One method is to find out what are the different IOS versions of each appliances and then compare them to the vulnerability reports.   The older the IOS, the longer the list of known vulnerabilities. 

The other method is to do a comprehensive upgrade of all the appliance to the latest version.  The problem with this is no one like to upgrade appliances because this means rebooting them and rebooting means dealing, liaising and negotiating with a lot of other teams/business units that it's just madness.   

Marvin Rhoads
Hall of Fame
Hall of Fame

Have you seen Cisco Active Advisor? It's free and while it may not cover every device (I don't think it handles IOS-XR), it's pretty comprehensive. See https://help.ciscoactiveadvisor.com/support/home

You could also reach out to a partner. For a network of that size, they could get Cisco to sponsor a Cisco Funded Network Assessment. Under the auspices of that, they can bring in something like Netformix or RISC Networks tools and run them (at no charge) for you.