Scan VyOS vulnerability with using wheezy repo.
https://github.com/future-architect/vuls
-
Add wheezy repo
set system package repository community url http://dev.packages.vyos.net/legacy/repos/vyos set system package repository wheezy url http://ftp.jp.debian.org/debian/ set system package repository wheezy components main contrib non-free set system package repository wheezy distribution wheezy set system package repository security url http://security.debian.org/ set system package repository security components main contrib non-free set system package repository security distribution wheezy/updates commit save cat <<EOF | sudo tee -a /etc/apt/source.list deb-src http://security.debian.org/ wheezy/updates main contrib non-free # security # deb-src http://ftp.jp.debian.org/debian/ wheezy main contrib non-free # wheezy # EOF sudo apt-get update sudo apt-get install debian-keyring debian-archive-keyring
-
Create config.toml
[servers] [servers.vyos117] host = "{vyos_ip_addr}" port = "22" user = "vyos" keyPath = "{full_path_to_private_key}" cpeNames = [ "cpe:/o:debian:debian_linux:6.0.10", "cpe:/a:tedfelix:acpid2:2.0.7", "cpe:/a:eject:eject:2.1.5", "cpe:/a:gnupg:gnupg:1.4.10", "cpe:/a:gnu:privacy_guard:1.4.10", "cpe:/a:conntrack-tools_project:conntrack-tools:1.0.1", "cpe:/a:gnu:grub2:1.98", "cpe:/a:gnu:glibc:2.11.3", "cpe:/a:xmlsoft:libxml:2.7.8", "cpe:/a:w1.fi:hostapd:1.1", "cpe:/a:iproute2_project:iproute2:3.12.0", "cpe:/a:netfilter_core_team:iptables:1.4.10", "cpe:/a:libcap:libcap:2.19", "cpe:/o:linux:linux_kernel:3.13.11", "cpe:/a:net-snmp:net-snmp:5.7.2", "cpe:/a:ntp:ntp:4.2.6.p2", "cpe:/a:openssl:openssl:0.9.8zf", "cpe:/a:openvpn:openvpn:2.1.3", "cpe:/a:quagga:quagga:0.99.20.1", "cpe:/a:litech:router_advertisement_daemon:1.15", "cpe:/a:squid-cache:squid:3.1.6", "cpe:/a:ssh:secure_shell:5.5p1", "cpe:/a:todd_miller:sudo:1.7.4p4", "cpe:/a:gnu:tar:1.23", "cpe:/a:squidguard:squidguard:1.4.0", "cpe:/a:strongswan:strongswan:4.5.2", "cpe:/a:vmware:tools:9.4.0", "cpe:/a:w1.fi:wpa_supplicant:1.1", ]
-
Run configtest
vuls configtest -ssh-native-insecure vyos117
-
Run scan
vuls scan -ssh-native-insecure vyos117
-
Run report
vuls report -format-one-line-text