Cisco Smart Install Escalation and Update!
![](https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/update-1024x731.jpg)
tl;dr
Both Cisco and Nessus have escalated the Smart Install Client Service feature/vulnerability.
Nessus is now reporting the Smart Install RCE as critical. High five!!!
![](https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/Screen-Shot-2018-12-21-at-11.51.28-AM-1024x394.png)
Cisco has also packaged up a couple of associated bugs, one of which requires a firmware update. The first is seen below:
![](https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/Screen-Shot-2018-12-21-at-11.54.50-AM-1024x504.png)
Reference to this advisory is listed here:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2
And, the latest update posted on 7-December-2018 lists the service as potentially dangerous and that the best practices configuration would not leave this service “lying around” for someone to stumble upon.
![](https://www.blackhillsinfosec.com/wp-content/uploads/2018/12/Screen-Shot-2018-12-21-at-11.56.50-AM-1024x593.png)
While the screenshot and text as seen above suck, the point is well received. The problem? It appears that based on the reference material, you will need a SmartNet or equivalent contract to get your hands on the updated software/firmware/IOS.
Reference:
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvd36820
Good luck and happy patching!
Want to learn more mad skills from the person who wrote this blog?
Check out this class from Kent and Jordan: