Get Cisco PSIRT OpenVuln for a provided platform/version and renders a markdown report.
Inspired by https://github.com/NWMichl/openvuln
Requirements:
Env vars:
export CISCO_API_KEY=myciscoapikey
export CISCO_CLIENT_SECRET=mycisccolientsecret
Or edit credentials in file *credentials.env"
Usage:
./opencheck.sh <platform> <version>
Example:
./opencheck.sh aci "14.2(1i)"
Output is written to a file in $PWD named
vuln-$platform-$version.md
Sample output:
Advisory-ID | Impact | CVSS | CVE | Fixed with | First Published |
---|---|---|---|---|---|
cisco-sa-20200226-fxos-nxos-cdp | Cisco FXOS and NX-OS Software Cisco Discovery Protocol Arbitrary Code Execution and Denial of Service Vulnerability | 8.8 | CVE-2020-3172 | 14.2(1j) | 2020-02-26T16:00:00 |
cisco-sa-20200205-fxnxos-iosxr-cdp-dos | Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability | 7.4 | CVE-2020-3120 | 14.2(1j) | 2020-02-05T16:00:00 |
cisco-sa-20200205-nxos-cdp-rce | Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability | 8.8 | CVE-2020-3119 | 14.2(1j) | 2020-02-05T16:00:00 |