First published: Fri May 20 2022(Updated: )
Cisco IOS XR software health check opens TCP port 6379 by default on activation. An attacker can connect to the Redis instance on the open port and allow access to the Redis instance that is running within the NOSi container.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XR | ||
Cisco 8201 | ||
Cisco 8202 | ||
Cisco 8208 | ||
Cisco 8212 | ||
Cisco 8218 | ||
Cisco Ncs-55a1-24h | ||
Cisco Ncs-55a1-24q6h-s | ||
Cisco Ncs-55a1-36h-s | ||
Cisco Ncs-55a1-36h-se | ||
Cisco Ncs-55a1-36h-se-s | ||
Cisco Ncs-55a2-mod-hd-s | ||
Cisco Ncs-55a2-mod-hx-s | ||
Cisco Ncs-55a2-mod-s | ||
Cisco Ncs-55a2-mod-se-h-s | ||
Cisco Ncs-55a2-mod-se-s | ||
Cisco Ncs 1001 | ||
Cisco Ncs 1002 | ||
Cisco Ncs 1004 | ||
Cisco Ncs 5001 | ||
Cisco Ncs 5002 | ||
Cisco Ncs 5501-se | ||
Cisco Ncs 5502-se | ||
Cisco Ncs 5504 | ||
Cisco Ncs 5508 | ||
Cisco Ncs 5516 | ||
Cisco Ncs 55a1 | ||
Cisco Ncs 55a2 | ||
All of | ||
Cisco IOS XR | ||
Any of | ||
Cisco 8201 | ||
Cisco 8202 | ||
Cisco 8208 | ||
Cisco 8212 | ||
Cisco 8218 | ||
Cisco Ncs-55a1-24h | ||
Cisco Ncs-55a1-24q6h-s | ||
Cisco Ncs-55a1-36h-s | ||
Cisco Ncs-55a1-36h-se | ||
Cisco Ncs-55a1-36h-se-s | ||
Cisco Ncs-55a2-mod-hd-s | ||
Cisco Ncs-55a2-mod-hx-s | ||
Cisco Ncs-55a2-mod-s | ||
Cisco Ncs-55a2-mod-se-h-s | ||
Cisco Ncs-55a2-mod-se-s | ||
Cisco Ncs 1001 | ||
Cisco Ncs 1002 | ||
Cisco Ncs 1004 | ||
Cisco Ncs 5001 | ||
Cisco Ncs 5002 | ||
Cisco Ncs 5501-se | ||
Cisco Ncs 5502-se | ||
Cisco Ncs 5504 | ||
Cisco Ncs 5508 | ||
Cisco Ncs 5516 | ||
Cisco Ncs 55a1 | ||
Cisco Ncs 55a2 | ||
Cisco IOS XR | ||
All of | ||
Any of | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Cisco IOS XR Open Port Vulnerability is CVE-2022-20821.
The severity of CVE-2022-20821 is medium, with a severity value of 6.5.
The vulnerability occurs because the health check RPM of Cisco IOS XR Software opens TCP port 6379 by default upon activation.
The vulnerability allows an unauthenticated, remote attacker to access the Redis instance running within the NOSi container.
It is recommended to apply the necessary updates or patches provided by Cisco to mitigate the vulnerability.