Synopsis: Arbitrary commands can be run on this port.
Description
A VxWorks WDB Debug Agent is running on this host.
Using this service, it is possible to read or write any memory zone or
execute arbitrary code on the host. An attacker can use this flaw to
take complete control of the affected device.
Solution
Disable the debug agent or contact the device's vendor for a patch.
Risk Factor: Critical
CVSS Base Score
10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score
9.5 (CVSS2#E:F/RL:U/RC:ND)
Plugin Output
Agent version : 2.0
MTU : 1500
Agent mode : 1
Run time type : 1 (WDB agent in VxWorks)
Run time version : VxWorks5.5.1
CPU type : 41
No FP coprocessor.
Target cannot write protect memory.
Page size : -1
Endianness : 1234
Board support package name : DCT2500
Memory base address : -2142666752
Memory size : 2097152
CVE
CVE-2010-2965
BID
42158
Xref
OSVDB:66842
CERT:362332
IAVB:2010-B-0075
ICSA:10-214-01
Vulnerability Publication Date: 2010/08/02
Plugin Publication Date: 2010/08/06
Plugin Last Modification Date: 2012/08/15
Public Exploit Available: True
Exploitable With: Metasploit (VxWorks WDB Agent Remote Memory Dump)
I did not try to exploit this since this is my production box. I am leaving for vacation soon and do not have time to setup a test box.
Does anyone know if this is a false positive or if there is a patch? I am running version 7 - the most up to date version. If there is no patch yet, will one be coming?
I plan to go to 9 soon, but am not quite ready.
Would this show up on the external interface??
Thanks,
C68[/SIZE]
This thread was automatically locked due to age.