This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Cisco IOS XR has an info leak flaw. π **Consequences**: Unauthenticated access to Redis. Attackers can write arbitrary files to the filesystem & steal DB info.β¦
π‘οΈ **Root Cause**: CWE-200 (Info Exposure). π **Flaw**: Health check RPM activates TCP port 6379 by default. π‘ **Result**: Exposes the Redis instance inside the NOSi container without protection.
Q3Who is affected? (Versions/Components)
π’ **Vendor**: Cisco. π¦ **Product**: Cisco IOS XR Software. π₯οΈ **Component**: Health check RPM / Redis instance in NOSi container. β οΈ **Scope**: Devices running this specific OS configuration.
π **Check**: Scan for TCP Port 6379. π‘ **Target**: Cisco IOS XR devices. π οΈ **Tool**: Use port scanners to detect open Redis ports. β οΈ **Flag**: If port 6379 is open & unauthenticated, you are vulnerable.
π§ **Workaround**: Block TCP 6379 via ACL/Firewall. π« **Restrict**: Prevent external access to NOSi container. π‘οΈ **Mitigate**: Close the port if patching is delayed. π **Limit**: Reduce attack surface significantly.
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: HIGH. π **CVSS**: L/C:L/I:L (Confidentiality/Integrity loss). π¨ **Risk**: Unauthenticated access is critical. π **Action**: Patch ASAP or apply network restrictions. β³ **Time**: Do not delay remediation.