Question 9 of 76 from exam 350-201-CBRCOR: Performing CyberOps Using Cisco Security Technologies

Question 9 of 76 from exam 350-201-CBRCOR: Performing CyberOps Using Cisco Security Technologies

Question

Vulnerability #1
A.vulnerability in the Command Line Interpreter (CLI) of ACME

Super Firewall (all models) could allow an attacker to execute
a. command which would overflow a buffer in memory. In
order to carry out this attack, the attacker needs to fulfill all of
the following conditions:

a) Be logged in to the device over telnet or SSH, or through
the local console
b) Be logged in as a high-privileges administrative user

In order to trigger the vulnerability, the attacker has to
execute a command on the device and supply a specially
crafted argument to such command. Once the command is
executed, an internal stack-based buffer overflow will be
triggered. This buffer overflow may lead to code execution
within the process space of the CLI parser, or may crash the
device.

All software versions are affected
Fixes are available now
There are no workarounds or mitigations

Avvulnerability in the web-based management interface of the
ACME Big Router models 1010 and 1020 could allow an attacker
to bypass authorization checks and then access sensitive
information on the device, modify the device's configuration,
impact the availability of the system, create administrative level
and regular level users on the device. In order to exploit this
vulnerability, the attacker needs to:

a) Be able to reach port 80/tcp on an affected de
b) The web-based management interface needs to be enabled on the
device

The attacker would then need to send a specially formed HTTP
request to the web-based management interface of an affected
system. The attacker does not need to log-in to the device before
launching the attack.

All software versions are affected

There are no fixes available now

Customers can disable the web-based management interface to
prevent exploitation. Customers will still be able to manage,
configure and monitor the device by using the Command Line
Interface (CLI), but with reduced capabilities for monitoring.

Refer to the exhibit.

How must these advisories be prioritized for handling?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.