cisco-sa-dnsmasq-dns-2021-c5mrdf3g
Vulnerability from csaf_cisco
Published
2021-01-19 12:15
Modified
2021-08-30 17:24
Summary
Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021

Notes

Summary
A set of previously unknown vulnerabilities in the DNS forwarder implementation of dnsmasq were disclosed on January 19, 2021. The vulnerabilities are collectively known as DNSpooq. Exploitation of these vulnerabilities could result in remote code execution or denial of service (DoS), or may allow an attacker to more easily forge DNS answers that can poison DNS caches, depending on the specific vulnerability. Multiple Cisco products are affected by these vulnerabilities. Cisco will release software updates that address these vulnerabilities. Any workarounds for a specific Cisco product or service will be documented in the relevant Cisco bugs, which are identified in the Vulnerable Products ["#vp"] section of this advisory. Note: At the time of publication, no Cisco products were found to be affected by the remote code execution and DoS vulnerabilities, which are identified by the following Common Vulnerabilities and Exposures (CVE) IDs: CVE-2020-25681 CVE-2020-25682 CVE-2020-25683 CVE-2020-25687 This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g"]
Affected Products
Cisco investigated its product line to determine which products may be affected by these vulnerabilities. The Vulnerable Products ["#vp"] section includes Cisco bug IDs for each affected product or service. The bugs are accessible through the Cisco Bug Search Tool ["https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID"] and contain additional platform-specific information, including workarounds (if available) and fixed software releases. Any product or service not listed in Vulnerable Products ["#vp"] section of this advisory is to be considered not vulnerable.
Vulnerable Products
For information about which Cisco software releases are vulnerable, see the Fixed Software ["#fs"] section of this advisory. At the time of this investigation, no Cisco products have been found to be affected by the remote code execution and DoS vulnerabilities. Multiple Cisco products have been found to be susceptible to DNS cache poisoning attacks. The following table lists Cisco products that have been found to be susceptible to DNS cache poisoning attacks. If a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details. Product Cisco Bug ID Fixed Release Availability Network Management and Provisioning Cisco Aironet 1560 Series Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] Wireless LAN Controller: 8.10.151.0 8.5.171.0 Catalyst 9800 Wireless Controller: 16.12.5 17.3.3 17.5.1 (Mar 2021) Cisco Aironet 1810 Series OfficeExtend Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] Wireless LAN Controller: 8.10.151.0 8.5.171.0 Catalyst 9800 Wireless Controller: 16.12.5 17.3.3 17.5.1 (Mar 2021) Cisco Aironet 1810w Series Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] Wireless LAN Controller: 8.10.151.0 8.5.171.0 Catalyst 9800 Wireless Controller: 16.12.5 17.3.3 17.5.1 (Mar 2021) Cisco Aironet 1815 Series Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] Wireless LAN Controller: 8.10.151.0 8.5.171.0 Catalyst 9800 Wireless Controller: 16.12.5 17.3.3 17.5.1 (Mar 2021) Cisco Aironet 1830 Series Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] Wireless LAN Controller: 8.10.151.0 8.5.171.0 Catalyst 9800 Wireless Controller: 16.12.5 17.3.3 17.5.1 (Mar 2021) Cisco Aironet 1850 Series Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] Wireless LAN Controller: 8.10.151.0 8.5.171.0 Catalyst 9800 Wireless Controller: 16.12.5 17.3.3 17.5.1 (Mar 2021) Cisco Aironet 2800 Series Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] Wireless LAN Controller: 8.10.151.0 8.5.171.0 Catalyst 9800 Wireless Controller: 16.12.5 17.3.3 17.5.1 (Mar 2021) Cisco Aironet 3800 Series Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] Wireless LAN Controller: 8.10.151.0 8.5.171.0 Catalyst 9800 Wireless Controller: 16.12.5 17.3.3 17.5.1 (Mar 2021) Cisco Aironet 4800 Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] Wireless LAN Controller: 8.10.151.0 8.5.171.0 Catalyst 9800 Wireless Controller: 16.12.5 17.3.3 17.5.1 (Mar 2021) Cisco Business 100 Series Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] 10.4.1.0 (Mar 2021) Cisco Business 200 Series Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] 10.4.1.0 (Mar 2021) Cisco Catalyst 9100 Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] Wireless LAN Controller: 8.10.151.0 Catalyst 9800 Wireless Controller: 16.12.5 17.3.3 17.5.1 (Mar 2021) Cisco Catalyst IW6300 Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] Wireless LAN Controller: 8.10.151.0 Catalyst 9800 Wireless Controller: 16.12.5 17.3.3 17.5.1 (Mar 2021) Cisco ESW6300 Series Access Points CSCvv83754 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"] Wireless LAN Controller: 8.10.151.0 Catalyst 9800 Wireless Controller: 16.12.5 17.3.3 17.5.1 (Mar 2021) Cisco Policy Suite CSCvv83241 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83241"] 21.1.0 Routing and Switching - Enterprise and Service Provider Cisco 1000 Series Connected Grid Routers (CGR1000 compute module) CSCvv84554 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84554"] 15.9(3)M4 (Jul 2021) Cisco IR800 Integrated Services Router (Guest OS) CSCvv84553 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84553"] 15.9(3)M4 (Jul 2021) Cisco Wireless Gateway for LoRaWAN CSCvw00914 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00914"] 2.1.0.3 (Mar 2021) Meraki Products Cisco Meraki MR (all models) N/A Release no. TBD (Aug 2021) Cisco Meraki MS (all models) N/A Release no. TBD (Aug 2021) Cisco Meraki MV (all models) N/A Release no. TBD (Aug 2021) Cisco Meraki MX (all models) N/A Release no. TBD (Aug 2021) Cisco Meraki Z-Series (all models) N/A Release no. TBD (Aug 2021) Routing and Switching - Small Business Cisco RV042 Dual WAN VPN Router CSCvv83789 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83789"] None planned Cisco RV042G Dual Gigabit WAN VPN Router CSCvv83789 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83789"] None planned Cisco RV160x VPN Router CSCvv83787 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83787"] 1.0.02.x (Mar 2021) Cisco RV260x VPN Router CSCvv83788 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83788"] 1.0.02.x (Mar 2021) Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router CSCvv83239 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83239"] 1.0.04.x (Mar 2021) Cisco Small Business RV Series RV110W Wireless-N VPN Firewall CSCvv83235 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83235"] None planned Cisco Small Business RV Series RV215W Wireless-N VPN Router CSCvv83237 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83237"] None planned Cisco Small Business RV Series RV320 Dual Gigabit WAN VPN Router CSCvv83238 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83238"] None planned Cisco Small Business RV Series RV325 Dual WAN VPN Router CSCvv83816 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83816"] None planned Cisco Small Business RV130 Series VPN Routers CSCvv83791 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83791"] None planned Cisco Small Business RV130 VPN Router CSCvv83236 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83236"] None planned Unified Computing Cisco Enterprise NFV Infrastructure Software (NFVIS) CSCvw00975 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00975"] 4.5 (Mar 2021) Voice and Unified Communications Devices Cisco IP Conference Phone 7832 CSCvv83246 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83246"] 14.0 (Mar 2021) Cisco IP Conference Phone 8832 CSCvv83250 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83250"] 14.0 (Mar 2021) Cisco IP Phone 6800 Series with Multiplatform Firmware CSCvv83248 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83248"] 11.3.4 (Jun 2021) Cisco IP Phone 6821 with Multiplatform Firmware CSCvw00982 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00982"] 11.3.4 (Jun 2021) Cisco IP Phone 7800 Series with Multiplatform Firmware CSCvv83243 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83243"] 11.3.4 (Jun 2021) Cisco IP Phone 7800 Series CSCvv83249 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83249"] 14.0 (Mar 2021) Cisco IP Phone 8800 Series with Multiplatform Firmware CSCvv83242 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83242"] 11.3.4 (Jun 2021) Cisco IP Phone 8800 Series CSCvv83242 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83242"] 14.0 (Mar 2021) Cisco IP Phone 8865 CSCvv83245 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83245"] 14.0 (Mar 2021) Cisco SPA112 2-Port Phone Adapter CSCvv83234 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234"] None planned Cisco SPA122 Analog Telephone Adapter (ATA) with Router CSCvv83234 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234"] None planned Cisco SPA232D Multi-Line DECT Analog Telephone Adapter (ATA) CSCvv83234 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234"] None planned Cisco Unified IP Phone 9951 CSCvv83247 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83247"] None planned Cisco Unified IP Phone 9971 CSCvv83247 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83247"] None planned Cisco Wireless IP Phone 8821 CSCvw00918 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00918"] 11.0(6)SR1 (Apr 2021) Video, Streaming, TelePresence, and Transcoding Devices Cisco Expressway Series CSCvv83227 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83227"] X12.7.1 Cisco TelePresence Video Communication Server (VCS) CSCvv83227 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83227"] X12.7.1 Cisco Cloud Hosted Services Cisco IP Phone 6800 Series CSCvw01205 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw01205"] 11.3.4 (Jun 2021) Cisco Spark Calling CSCvw00907 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00907"] X12.7.1 (Feb 2021) Cisco Webex Teams (formerly Cisco Spark) CSCvv83214 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83214"] None planned Cisco Webex Room Phone CSCvv87082 ["https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv87082"] 1.2(0)SR1 (Aug 2021)
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by these vulnerabilities. Cisco products that do not offer DNS server capabilities are not affected by these vulnerabilities. Cisco has also confirmed that Cisco IOS XE Software is not affected by any of these vulnerabilities. At the time of publication, no Cisco products were found to be affected by the vulnerabilities identified by the following Common Vulnerabilities and Exposures (CVE) IDs: CVE-2020-25681 CVE-2020-25682 CVE-2020-25683 CVE-2020-25687
Details
Remote Code Execution and Denial of Service Vulnerabilities Multiple vulnerabilities in the DNSSEC implementation of dnsmasq could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. The vulnerabilities are due to improper memory management when the affected software processes DNS packets with DNSSEC data. An attacker could exploit these vulnerabilities by sending malicious DNS packets to be processed by the affected device. When these packets are processed, an exploitable overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the underlying dnsmasq software or cause DoS condition on the affected device. These vulnerabilities affect dnsmasq installations that match all of the following criteria: Include a vulnerable release of dnsmasq Capable of acting as a DNS server Capable of validating DNSSEC data These vulnerabilities have been assigned the following CVE IDs: CVE-2020-25681 CVE-2020-25682 CVE-2020-25683 CVE-2020-25687 At the time of this investigation, no Cisco products have been found to be affected by these vulnerabilities. DNS Cache Poisoning Attacks Multiple weaknesses in the DNS server functionality of dnsmasq could allow an unauthenticated, remote attacker to more easily forge DNS answers that can poison DNS caches. Each weakness results in dnsmasq accepting DNS answers based on checks that are performed on an amount of entropy that is lower than what is mandated by RFC 5452. The combination of these weaknesses would allow an attacker to mount a successful DNS cache poisoning attack with low traffic requirements. These weaknesses affect dnsmasq installations that match all of the following criteria: Include a vulnerable release of dnsmasq Capable of acting as a DNS server Capable of caching DNS responses These weaknesses have been assigned the following CVE IDs: CVE-2020-25684 CVE-2020-25685 CVE-2020-25686 Multiple Cisco products have been found to be susceptible to DNS cache poisoning attacks.
Workarounds
Any workarounds for a specific Cisco product or service will be documented in the relevant Cisco bugs, which are identified in the Vulnerable Products ["#vp"] section of this advisory.
Fixed Software
For information about fixed software releases ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], consult the Cisco bugs identified in the Vulnerable Products ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g#vp"] section of this advisory. When considering software upgrades ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Vulnerability Policy
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Exploitation and Public Announcements
The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory. Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.
Source
Cisco would like to thank Moshe Kol and Shlomi Oberman of JSOF for reporting these vulnerabilities, which were investigated and disclosed under the coordination of CERT/CC.
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.



{
  "document": {
    "acknowledgments": [
      {
        "summary": "Cisco would like to thank Moshe Kol and Shlomi Oberman of JSOF for reporting these vulnerabilities, which were investigated and disclosed under the coordination of CERT/CC."
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "notes": [
      {
        "category": "summary",
        "text": "A set of previously unknown vulnerabilities in the DNS forwarder implementation of dnsmasq were disclosed on January 19, 2021. The vulnerabilities are collectively known as DNSpooq.\r\n\r\nExploitation of these vulnerabilities could result in remote code execution or denial of service (DoS), or may allow an attacker to more easily forge DNS answers that can poison DNS caches, depending on the specific vulnerability.\r\n\r\nMultiple Cisco products are affected by these vulnerabilities.\r\n\r\nCisco will release software updates that address these vulnerabilities. Any workarounds for a specific Cisco product or service will be documented in the relevant Cisco bugs, which are identified in the Vulnerable Products [\"#vp\"] section of this advisory.\r\n\r\nNote: At the time of publication, no Cisco products were found to be affected by the remote code execution and DoS vulnerabilities, which are identified by the following Common Vulnerabilities and Exposures (CVE) IDs:\r\n\r\n\r\nCVE-2020-25681\r\nCVE-2020-25682\r\nCVE-2020-25683\r\nCVE-2020-25687\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g\"]",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "Cisco investigated its product line to determine which products may be affected by these vulnerabilities.\r\n\r\nThe Vulnerable Products [\"#vp\"] section includes Cisco bug IDs for each affected product or service. The bugs are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"] and contain additional platform-specific information, including workarounds (if available) and fixed software releases.\r\n\r\nAny product or service not listed in Vulnerable Products [\"#vp\"] section of this advisory is to be considered not vulnerable.",
        "title": "Affected Products"
      },
      {
        "category": "general",
        "text": "For information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n\r\nAt the time of this investigation, no Cisco products have been found to be affected by the remote code execution and DoS vulnerabilities.\r\n\r\nMultiple Cisco products have been found to be susceptible to DNS cache poisoning attacks. The following table lists Cisco products that have been found to be susceptible to DNS cache poisoning attacks.\r\n\r\nIf a future release date is indicated for software, the date provided represents an estimate based on all information known to Cisco as of the Last Updated date at the top of the advisory. Availability dates are subject to change based on a number of factors, including satisfactory testing results and delivery of other priority features and fixes. If no version or date is listed for an affected component (indicated by a blank field and/or an advisory designation of Interim), Cisco is continuing to evaluate the fix and will update the advisory as additional information becomes available. After the advisory is marked Final, customers should refer to the associated Cisco bug(s) for further details.\r\n        Product  Cisco Bug ID  Fixed Release Availability      Network Management and Provisioning      Cisco Aironet 1560 Series Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021)      Cisco Aironet 1810 Series OfficeExtend Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021)      Cisco Aironet 1810w Series Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021)      Cisco Aironet 1815 Series Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021)      Cisco Aironet 1830 Series Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021)      Cisco Aironet 1850 Series Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021)      Cisco Aironet 2800 Series Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021)      Cisco Aironet 3800 Series Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021)      Cisco Aironet 4800 Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  Wireless LAN Controller:\r\n8.10.151.0\r\n8.5.171.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021)      Cisco Business 100 Series Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  10.4.1.0 (Mar 2021)      Cisco Business 200 Series Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  10.4.1.0 (Mar 2021)      Cisco Catalyst 9100 Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  Wireless LAN Controller:\r\n8.10.151.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021)      Cisco Catalyst IW6300 Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  Wireless LAN Controller:\r\n8.10.151.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021)      Cisco ESW6300 Series Access Points  CSCvv83754 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754\"]  Wireless LAN Controller:\r\n8.10.151.0\r\n\r\nCatalyst 9800 Wireless Controller:\r\n16.12.5\r\n17.3.3\r\n17.5.1 (Mar 2021)      Cisco Policy Suite  CSCvv83241 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83241\"]  21.1.0      Routing and Switching - Enterprise and Service Provider      Cisco 1000 Series Connected Grid Routers (CGR1000 compute module)  CSCvv84554 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84554\"]  15.9(3)M4 (Jul 2021)      Cisco IR800 Integrated Services Router (Guest OS)  CSCvv84553 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84553\"]  15.9(3)M4 (Jul 2021)      Cisco Wireless Gateway for LoRaWAN  CSCvw00914 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00914\"]  2.1.0.3 (Mar 2021)      Meraki Products      Cisco Meraki MR (all models)  N/A  Release no. TBD (Aug 2021)      Cisco Meraki MS (all models)  N/A  Release no. TBD (Aug 2021)      Cisco Meraki MV (all models)  N/A  Release no. TBD (Aug 2021)      Cisco Meraki MX (all models)  N/A  Release no. TBD (Aug 2021)      Cisco Meraki Z-Series (all models)  N/A  Release no. TBD (Aug 2021)      Routing and Switching - Small Business      Cisco RV042 Dual WAN VPN Router  CSCvv83789 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83789\"]  None planned      Cisco RV042G Dual Gigabit WAN VPN Router  CSCvv83789 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83789\"]  None planned      Cisco RV160x VPN Router  CSCvv83787 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83787\"]  1.0.02.x (Mar 2021)      Cisco RV260x VPN Router  CSCvv83788 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83788\"]  1.0.02.x (Mar 2021)      Cisco RV340W Dual WAN Gigabit Wireless-AC VPN Router  CSCvv83239 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83239\"]  1.0.04.x (Mar 2021)      Cisco Small Business RV Series RV110W Wireless-N VPN Firewall  CSCvv83235 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83235\"]  None planned      Cisco Small Business RV Series RV215W Wireless-N VPN Router  CSCvv83237 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83237\"]  None planned      Cisco Small Business RV Series RV320 Dual Gigabit WAN VPN Router  CSCvv83238 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83238\"]  None planned      Cisco Small Business RV Series RV325 Dual WAN VPN Router  CSCvv83816 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83816\"]  None planned      Cisco Small Business RV130 Series VPN Routers  CSCvv83791 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83791\"]  None planned      Cisco Small Business RV130 VPN Router  CSCvv83236 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83236\"]  None planned      Unified Computing      Cisco Enterprise NFV Infrastructure Software (NFVIS)  CSCvw00975 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00975\"]  4.5 (Mar 2021)      Voice and Unified Communications Devices      Cisco IP Conference Phone 7832  CSCvv83246 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83246\"]  14.0 (Mar 2021)      Cisco IP Conference Phone 8832  CSCvv83250 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83250\"]  14.0 (Mar 2021)      Cisco IP Phone 6800 Series with Multiplatform Firmware  CSCvv83248 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83248\"]  11.3.4 (Jun 2021)      Cisco IP Phone 6821 with Multiplatform Firmware  CSCvw00982 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00982\"]  11.3.4 (Jun 2021)      Cisco IP Phone 7800 Series with Multiplatform Firmware  CSCvv83243 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83243\"]  11.3.4 (Jun 2021)      Cisco IP Phone 7800 Series  CSCvv83249 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83249\"]  14.0 (Mar 2021)      Cisco IP Phone 8800 Series with Multiplatform Firmware  CSCvv83242 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83242\"]  11.3.4 (Jun 2021)      Cisco IP Phone 8800 Series  CSCvv83242 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83242\"]  14.0 (Mar 2021)      Cisco IP Phone 8865  CSCvv83245 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83245\"]  14.0 (Mar 2021)      Cisco SPA112 2-Port Phone Adapter  CSCvv83234 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234\"]  None planned      Cisco SPA122 Analog Telephone Adapter (ATA) with Router  CSCvv83234 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234\"]  None planned      Cisco SPA232D Multi-Line DECT Analog Telephone Adapter (ATA)  CSCvv83234 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234\"]  None planned      Cisco Unified IP Phone 9951  CSCvv83247 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83247\"]\r\nNone planned      Cisco Unified IP Phone 9971  CSCvv83247 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83247\"]\r\nNone planned      Cisco Wireless IP Phone 8821  CSCvw00918 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00918\"]   11.0(6)SR1 (Apr 2021)      Video, Streaming, TelePresence, and Transcoding Devices      Cisco Expressway Series  CSCvv83227 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83227\"]  X12.7.1      Cisco TelePresence Video Communication Server (VCS)  CSCvv83227 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83227\"]  X12.7.1      Cisco Cloud Hosted Services      Cisco IP Phone 6800 Series  CSCvw01205 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw01205\"]  11.3.4 (Jun 2021)      Cisco Spark Calling  CSCvw00907 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00907\"]  X12.7.1 (Feb 2021)      Cisco Webex Teams (formerly Cisco Spark)  CSCvv83214 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83214\"]  None planned      Cisco Webex Room Phone  CSCvv87082 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv87082\"]  1.2(0)SR1 (Aug 2021)",
        "title": "Vulnerable Products"
      },
      {
        "category": "general",
        "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco products that do not offer DNS server capabilities are not affected by these vulnerabilities. Cisco has also confirmed that Cisco IOS XE Software is not affected by any of these vulnerabilities.\r\n\r\nAt the time of publication, no Cisco products were found to be affected by the vulnerabilities identified by the following Common Vulnerabilities and Exposures (CVE) IDs:\r\n\r\nCVE-2020-25681\r\nCVE-2020-25682\r\nCVE-2020-25683\r\nCVE-2020-25687",
        "title": "Products Confirmed Not Vulnerable"
      },
      {
        "category": "general",
        "text": "Remote Code Execution and Denial of Service Vulnerabilities\r\n\r\nMultiple vulnerabilities in the DNSSEC implementation of dnsmasq could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device.\r\n\r\nThe vulnerabilities are due to improper memory management when the affected software processes DNS packets with DNSSEC data. An attacker could exploit these vulnerabilities by sending malicious DNS packets to be processed by the affected device.\r\n\r\nWhen these packets are processed, an exploitable overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the underlying dnsmasq software or cause DoS condition on the affected device.\r\n\r\nThese vulnerabilities affect dnsmasq installations that match all of the following criteria:\r\n\r\nInclude a vulnerable release of dnsmasq\r\nCapable of acting as a DNS server\r\nCapable of validating DNSSEC data\r\n\r\nThese vulnerabilities have been assigned the following CVE IDs:\r\n\r\n\r\nCVE-2020-25681\r\nCVE-2020-25682\r\nCVE-2020-25683\r\nCVE-2020-25687\r\n\r\nAt the time of this investigation, no Cisco products have been found to be affected by these vulnerabilities.\r\n\r\nDNS Cache Poisoning Attacks\r\n\r\nMultiple weaknesses in the DNS server functionality of dnsmasq could allow an unauthenticated, remote attacker to more easily forge DNS answers that can poison DNS caches.\r\n\r\nEach weakness results in dnsmasq accepting DNS answers based on checks that are performed on an amount of entropy that is lower than what is mandated by RFC 5452. The combination of these weaknesses would allow an attacker to mount a successful DNS cache poisoning attack with low traffic requirements.\r\n\r\nThese weaknesses affect dnsmasq installations that match all of the following criteria:\r\n\r\nInclude a vulnerable release of dnsmasq\r\nCapable of acting as a DNS server\r\nCapable of caching DNS responses\r\n\r\nThese weaknesses have been assigned the following CVE IDs:\r\n\r\nCVE-2020-25684\r\nCVE-2020-25685\r\nCVE-2020-25686\r\n\r\nMultiple Cisco products have been found to be susceptible to DNS cache poisoning attacks.",
        "title": "Details"
      },
      {
        "category": "general",
        "text": "Any workarounds for a specific Cisco product or service will be documented in the relevant Cisco bugs, which are identified in the Vulnerable Products [\"#vp\"] section of this advisory.",
        "title": "Workarounds"
      },
      {
        "category": "general",
        "text": "For information about fixed software releases [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], consult the Cisco bugs identified in the Vulnerable Products [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g#vp\"] section of this advisory.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.",
        "title": "Fixed Software"
      },
      {
        "category": "general",
        "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
        "title": "Vulnerability Policy"
      },
      {
        "category": "general",
        "text": "The Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nCisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory.",
        "title": "Exploitation and Public Announcements"
      },
      {
        "category": "general",
        "text": "Cisco would like to thank Moshe Kol and Shlomi Oberman of JSOF for reporting these vulnerabilities, which were investigated and disclosed under the coordination of CERT/CC.",
        "title": "Source"
      },
      {
        "category": "legal_disclaimer",
        "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
        "title": "Legal Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
      "issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
      "name": "Cisco",
      "namespace": "https://wwww.cisco.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021",
        "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g"
      },
      {
        "category": "external",
        "summary": "Cisco Security Vulnerability Policy",
        "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
      },
      {
        "category": "external",
        "summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g",
        "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g"
      },
      {
        "category": "external",
        "summary": "Cisco\u0026nbsp;Bug Search Tool",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83754",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83754"
      },
      {
        "category": "external",
        "summary": "CSCvv83241",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83241"
      },
      {
        "category": "external",
        "summary": "CSCvv84554",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84554"
      },
      {
        "category": "external",
        "summary": "CSCvv84553",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv84553"
      },
      {
        "category": "external",
        "summary": "CSCvw00914",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00914"
      },
      {
        "category": "external",
        "summary": "CSCvv83789",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83789"
      },
      {
        "category": "external",
        "summary": "CSCvv83789",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83789"
      },
      {
        "category": "external",
        "summary": "CSCvv83787",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83787"
      },
      {
        "category": "external",
        "summary": "CSCvv83788",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83788"
      },
      {
        "category": "external",
        "summary": "CSCvv83239",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83239"
      },
      {
        "category": "external",
        "summary": "CSCvv83235",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83235"
      },
      {
        "category": "external",
        "summary": "CSCvv83237",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83237"
      },
      {
        "category": "external",
        "summary": "CSCvv83238",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83238"
      },
      {
        "category": "external",
        "summary": "CSCvv83816",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83816"
      },
      {
        "category": "external",
        "summary": "CSCvv83791",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83791"
      },
      {
        "category": "external",
        "summary": "CSCvv83236",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83236"
      },
      {
        "category": "external",
        "summary": "CSCvw00975",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00975"
      },
      {
        "category": "external",
        "summary": "CSCvv83246",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83246"
      },
      {
        "category": "external",
        "summary": "CSCvv83250",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83250"
      },
      {
        "category": "external",
        "summary": "CSCvv83248",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83248"
      },
      {
        "category": "external",
        "summary": "CSCvw00982",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00982"
      },
      {
        "category": "external",
        "summary": "CSCvv83243",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83243"
      },
      {
        "category": "external",
        "summary": "CSCvv83249",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83249"
      },
      {
        "category": "external",
        "summary": "CSCvv83242",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83242"
      },
      {
        "category": "external",
        "summary": "CSCvv83242",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83242"
      },
      {
        "category": "external",
        "summary": "CSCvv83245",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83245"
      },
      {
        "category": "external",
        "summary": "CSCvv83234",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234"
      },
      {
        "category": "external",
        "summary": "CSCvv83234",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234"
      },
      {
        "category": "external",
        "summary": "CSCvv83234",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83234"
      },
      {
        "category": "external",
        "summary": "CSCvv83247",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83247"
      },
      {
        "category": "external",
        "summary": "CSCvv83247",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83247"
      },
      {
        "category": "external",
        "summary": "CSCvw00918",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00918"
      },
      {
        "category": "external",
        "summary": "CSCvv83227",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83227"
      },
      {
        "category": "external",
        "summary": "CSCvv83227",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83227"
      },
      {
        "category": "external",
        "summary": "CSCvw01205",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw01205"
      },
      {
        "category": "external",
        "summary": "CSCvw00907",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvw00907"
      },
      {
        "category": "external",
        "summary": "CSCvv83214",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv83214"
      },
      {
        "category": "external",
        "summary": "CSCvv87082",
        "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv87082"
      },
      {
        "category": "external",
        "summary": "fixed software releases",
        "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
      },
      {
        "category": "external",
        "summary": "Vulnerable Products",
        "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnsmasq-dns-2021-c5mrdf3g#vp"
      },
      {
        "category": "external",
        "summary": "considering software upgrades",
        "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
      },
      {
        "category": "external",
        "summary": "Cisco\u0026nbsp;Security Advisories page",
        "url": "https://www.cisco.com/go/psirt"
      },
      {
        "category": "external",
        "summary": "Security Vulnerability Policy",
        "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
      }
    ],
    "title": "Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021",
    "tracking": {
      "current_release_date": "2021-08-30T17:24:42+00:00",
      "generator": {
        "date": "2022-10-22T03:10:44+00:00",
        "engine": {
          "name": "TVCE"
        }
      },
      "id": "cisco-sa-dnsmasq-dns-2021-c5mrdf3g",
      "initial_release_date": "2021-01-19T12:15:00+00:00",
      "revision_history": [
        {
          "date": "2021-01-19T12:05:02+00:00",
          "number": "1.0.0",
          "summary": "Initial public release."
        },
        {
          "date": "2021-02-02T17:34:33+00:00",
          "number": "1.1.0",
          "summary": "Updated fixed release availability information for Cisco Meraki devices, Cisco Access Points, Cisco IR800 Integrated Services Router, and Cisco 1000 Series Connected Grid Routers."
        },
        {
          "date": "2021-03-09T12:32:04+00:00",
          "number": "1.2.0",
          "summary": "Updated fixed release availability information."
        },
        {
          "date": "2021-04-26T12:02:10+00:00",
          "number": "1.3.0",
          "summary": "Updated list of products confirmed not vulnerable. Removed list of products under investigation."
        },
        {
          "date": "2021-08-30T17:24:42+00:00",
          "number": "1.4.0",
          "summary": "Updated Webex Room Phone fixed release."
        }
      ],
      "status": "final",
      "version": "1.4.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_family",
            "name": "Cisco NX-OS Software",
            "product": {
              "name": "Cisco NX-OS Software ",
              "product_id": "CSAFPID-80720"
            }
          },
          {
            "category": "product_family",
            "name": "Cisco Identity Services Engine Software",
            "product": {
              "name": "Cisco Identity Services Engine Software ",
              "product_id": "CSAFPID-111903"
            }
          },
          {
            "category": "product_family",
            "name": "Cisco TelePresence Video Communication Server (VCS) Expressway",
            "product": {
              "name": "Cisco TelePresence Video Communication Server (VCS) Expressway ",
              "product_id": "CSAFPID-209614"
            }
          },
          {
            "category": "product_family",
            "name": "Cisco Session Initiation Protocol (SIP) Software",
            "product": {
              "name": "Cisco Session Initiation Protocol (SIP) Software ",
              "product_id": "CSAFPID-277608"
            }
          }
        ],
        "category": "vendor",
        "name": "Cisco"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-25683",
      "ids": [
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66581"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66584"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx17339"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx20637"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvv83232"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvw00918"
        }
      ],
      "notes": [
        {
          "category": "other",
          "text": "Complete.",
          "title": "Affected Product Comprehensiveness"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-80720",
          "CSAFPID-209614",
          "CSAFPID-111903",
          "CSAFPID-277608"
        ]
      },
      "release_date": "2021-01-19T12:15:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Cisco has released software updates that address this vulnerability.",
          "product_ids": [
            "CSAFPID-80720",
            "CSAFPID-277608",
            "CSAFPID-209614",
            "CSAFPID-111903"
          ],
          "url": "https://software.cisco.com"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-80720",
            "CSAFPID-209614",
            "CSAFPID-111903",
            "CSAFPID-277608"
          ]
        }
      ],
      "title": "vuln-CVE-2020-25683"
    },
    {
      "cve": "CVE-2020-25687",
      "ids": [
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvv83232"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx17339"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx20637"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66581"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66584"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvw00918"
        }
      ],
      "notes": [
        {
          "category": "other",
          "text": "Complete.",
          "title": "Affected Product Comprehensiveness"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-111903",
          "CSAFPID-209614",
          "CSAFPID-80720",
          "CSAFPID-277608"
        ]
      },
      "release_date": "2021-01-19T12:15:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Cisco has released software updates that address this vulnerability.",
          "product_ids": [
            "CSAFPID-80720",
            "CSAFPID-277608",
            "CSAFPID-209614",
            "CSAFPID-111903"
          ],
          "url": "https://software.cisco.com"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-111903",
            "CSAFPID-209614",
            "CSAFPID-80720",
            "CSAFPID-277608"
          ]
        }
      ],
      "title": "vuln-CVE-2020-25687"
    },
    {
      "cve": "CVE-2020-25681",
      "ids": [
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx20637"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66581"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66584"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvw00918"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvv83232"
        }
      ],
      "notes": [
        {
          "category": "other",
          "text": "Complete.",
          "title": "Affected Product Comprehensiveness"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-209614",
          "CSAFPID-80720",
          "CSAFPID-277608",
          "CSAFPID-111903"
        ]
      },
      "release_date": "2021-01-19T12:15:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Cisco has released software updates that address this vulnerability.",
          "product_ids": [
            "CSAFPID-80720",
            "CSAFPID-277608",
            "CSAFPID-209614",
            "CSAFPID-111903"
          ],
          "url": "https://software.cisco.com"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-209614",
            "CSAFPID-80720",
            "CSAFPID-277608",
            "CSAFPID-111903"
          ]
        }
      ],
      "title": "vuln-CVE-2020-25681"
    },
    {
      "cve": "CVE-2020-25682",
      "ids": [
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx20637"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvw00918"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvv83232"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66581"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66584"
        }
      ],
      "notes": [
        {
          "category": "other",
          "text": "Complete.",
          "title": "Affected Product Comprehensiveness"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-209614",
          "CSAFPID-277608",
          "CSAFPID-111903",
          "CSAFPID-80720"
        ]
      },
      "release_date": "2021-01-19T12:15:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Cisco has released software updates that address this vulnerability.",
          "product_ids": [
            "CSAFPID-80720",
            "CSAFPID-277608",
            "CSAFPID-209614",
            "CSAFPID-111903"
          ],
          "url": "https://software.cisco.com"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-209614",
            "CSAFPID-277608",
            "CSAFPID-111903",
            "CSAFPID-80720"
          ]
        }
      ],
      "title": "vuln-CVE-2020-25682"
    },
    {
      "cve": "CVE-2020-25686",
      "ids": [
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvw00918"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66581"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66584"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx17339"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx20637"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvv83232"
        }
      ],
      "notes": [
        {
          "category": "other",
          "text": "Complete.",
          "title": "Affected Product Comprehensiveness"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-277608",
          "CSAFPID-80720",
          "CSAFPID-209614",
          "CSAFPID-111903"
        ]
      },
      "release_date": "2021-01-19T12:15:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Cisco has released software updates that address this vulnerability.",
          "product_ids": [
            "CSAFPID-80720",
            "CSAFPID-277608",
            "CSAFPID-209614",
            "CSAFPID-111903"
          ],
          "url": "https://software.cisco.com"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-277608",
            "CSAFPID-80720",
            "CSAFPID-209614",
            "CSAFPID-111903"
          ]
        }
      ],
      "title": "vuln-CVE-2020-25686"
    },
    {
      "cve": "CVE-2020-25685",
      "ids": [
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx20637"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvw00918"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvv83232"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66581"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66584"
        }
      ],
      "notes": [
        {
          "category": "other",
          "text": "Complete.",
          "title": "Affected Product Comprehensiveness"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-209614",
          "CSAFPID-277608",
          "CSAFPID-111903",
          "CSAFPID-80720"
        ]
      },
      "release_date": "2021-01-19T12:15:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Cisco has released software updates that address this vulnerability.",
          "product_ids": [
            "CSAFPID-80720",
            "CSAFPID-277608",
            "CSAFPID-209614",
            "CSAFPID-111903"
          ],
          "url": "https://software.cisco.com"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-209614",
            "CSAFPID-277608",
            "CSAFPID-111903",
            "CSAFPID-80720"
          ]
        }
      ],
      "title": "vuln-CVE-2020-25685"
    },
    {
      "cve": "CVE-2020-25684",
      "ids": [
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvw00918"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvv83232"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66581"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx66584"
        },
        {
          "system_name": "Cisco Bug ID",
          "text": "CSCvx20637"
        }
      ],
      "notes": [
        {
          "category": "other",
          "text": "Complete.",
          "title": "Affected Product Comprehensiveness"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-277608",
          "CSAFPID-111903",
          "CSAFPID-80720",
          "CSAFPID-209614"
        ]
      },
      "release_date": "2021-01-19T12:15:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "Cisco has released software updates that address this vulnerability.",
          "product_ids": [
            "CSAFPID-80720",
            "CSAFPID-277608",
            "CSAFPID-209614",
            "CSAFPID-111903"
          ],
          "url": "https://software.cisco.com"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-277608",
            "CSAFPID-111903",
            "CSAFPID-80720",
            "CSAFPID-209614"
          ]
        }
      ],
      "title": "Multiple Vulnerabilities in dnsmasq DNS server affecting Cisco Products: January 2021"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.