cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2401
Views
0
Helpful
3
Replies

Cisco IOS Software DHCP Remote Code Execution Vulnerability on Cisco 4928-10GE

drpillow
Level 1
Level 1

I currently have a 4928-10GE that is running the latest code release of 15.0.2-SG11.  I am still getting a Nessus Vulnerability for Cisco IOS Software DHCP Remote Code Execution Vulnerability.  I consulted Cisco Documentation.    The switch is giving out ip-helper addresses for several VLANS for PXE/DHCP forwarding, which is why the vulnerability is showing up from what I read in the documentation.

 

Is there a work around for this vulnerability, since no newer IOS releases are available?

1 Accepted Solution

Accepted Solutions

Bogdan Nita
VIP Alumni
VIP Alumni

There is no workaround.

In order to address this you would need to upgrade the software, but the 4928 is eol so no new software is available for this devices.

You could turn off the dhcp relay or upgrade the devices.

 

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-dhcp

https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-4900-series-switches/eol_c51-702107.html

 

HTH

Bogdan

View solution in original post

3 Replies 3

Bogdan Nita
VIP Alumni
VIP Alumni

There is no workaround.

In order to address this you would need to upgrade the software, but the 4928 is eol so no new software is available for this devices.

You could turn off the dhcp relay or upgrade the devices.

 

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-dhcp

https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-4900-series-switches/eol_c51-702107.html

 

HTH

Bogdan

Thank you, so remove the ip-helper relays on each VLAN.

 

Thanks for the information.

 

Yes that will mitigate the DHCP Remote Code Execution Vulnerability, but it will also stop the clients getting IPs from the DHCP server.