OPENCHECK

published

Get Cisco PSIRT OpenVuln for a provided platform/version and renders a markdown report.

Inspired by https://github.com/NWMichl/openvuln

Requirements:

Env vars:

export CISCO_API_KEY=myciscoapikey
export CISCO_CLIENT_SECRET=mycisccolientsecret

Or edit credentials in file *credentials.env"

Usage:

./opencheck.sh <platform> <version>

Example:

./opencheck.sh aci "14.2(1i)"

Output is written to a file in $PWD named

vuln-$platform-$version.md

Sample output:


Security posture via Cisco PSIRT OpenVuln API

Platform: aci

Version: 14.2(1i)

Advisory-ID Impact CVSS CVE Fixed with First Published
cisco-sa-20200226-fxos-nxos-cdp Cisco FXOS and NX-OS Software Cisco Discovery Protocol Arbitrary Code Execution and Denial of Service Vulnerability 8.8 CVE-2020-3172 14.2(1j) 2020-02-26T16:00:00
cisco-sa-20200205-fxnxos-iosxr-cdp-dos Cisco FXOS, IOS XR, and NX-OS Software Cisco Discovery Protocol Denial of Service Vulnerability 7.4 CVE-2020-3120 14.2(1j) 2020-02-05T16:00:00
cisco-sa-20200205-nxos-cdp-rce Cisco NX-OS Software Cisco Discovery Protocol Remote Code Execution Vulnerability 8.8 CVE-2020-3119 14.2(1j) 2020-02-05T16:00:00
View code on GitHub

Code Exchange Community

Get help, share code, and collaborate with other developers in the Code Exchange community.View Community
Disclaimer:
Cisco provides Code Exchange for convenience and informational purposes only, with no support of any kind. This page contains information and links from third-party websites that are governed by their own separate terms. Reference to a project or contributor on this page does not imply any affiliation with or endorsement by Cisco.