Symptom
Cisco FireSIGHT System Software includes a version of the Open Security Shell (OpenSSH)
Protocol that is affected by the vulnerabilities identified by the following Common
Vulnerability and Exposures (CVE) IDs:
CVE-2016-10009, CVE-2016-10010, CVE-2016-10011, CVE-2016-10012
This bug was opened to address the potential impact on this product.
Conditions
Device with default configuration.
Workaround
1. Limit access to the device using access control.
2. It is not recommended that users SSH to remote servers from the devices.
3 it is possible to remove the SSH client from some platforms.
Further Problem Description
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html.
PSIRT Evaluation:
Credit:
Cisco would like to thank security researcher Liam Somerville for finding and reporting this vulnerability.
The Cisco PSIRT has assigned this bug the following CVSS version 3 score. The Base CVSS score as of the time of evaluation is 7.3:
https://tools.cisco.com/security/center/cvssCalculator.x?version=3.0&vector=CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X
CVE ID CVE-2016-10009, CVE-2016-10010, CVE-2016-10011, CVE-2016-10012 has been assigned to document this issue.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html