[<prev] [next>] [day] [month] [year] [list]
Message-id: <200702161100@psirt.cisco.com>
Date: Thur, 16 Feb 2007 11:00:00 +0800
From: psirt@...co.com
To: bugtraq@...urityfocus.com
Subject: RE:Drive-by Pharming Threat
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco Security Response: Potential exploitation of default administrative
credentials
Response ID: cisco-sr-20070215-http
http://www.cisco.com/warp/public/707/cisco-sr-20070215-http.shtml
Revision: 1.0
For Public Release 2007 Feb 15 1600 UTC (GMT)
- -------------------------------------------------------------------------
Contents
========
Cisco Response
Additional Information
Revision History
Cisco Security Procedures
- -------------------------------------------------------------------------
Cisco Response
==============
This is a response to a Symantec published research paper posted on their
website at:
http://www.symantec.com/enterprise/security_response/weblog/2007/02/driveby_pharming_how_clicking_1.html
and entitled 'Drive-by Pharming'. In particular, this response focuses on
the information in the Symantec paper, as relevant to certain of Cisco's
non-consumer products. These products are specified in the "Cisco
Routers Impacted' section below.
Purpose of this Response
+-----------------------
As the paper does not disclose any new vulnerability in Cisco products,
Cisco is issuing this response and not a Security Advisory. The purpose
of this response is to inform customers how to change any default
credentials which may ship pre-configured on an impacted Cisco router
(identified below), upon initial configuration and before the device is
connected to a public network.
This response is available at:
http://www.cisco.com/warp/public/707/cisco-sr-20070215-http.shtml
Cisco Routers Impacted
+---------------------
Several types of Cisco routers that are marketed for the Small Office/
Home Office (SOHO), Remote Office/Branch Office (ROBO) and Teleworker
business segments may include either Cisco Router Web Setup tool (CRWS)
or Cisco Router and Security Device Manager (SDM), which are web-based
device-management tools for Cisco IOS Software-based routers.
Those Cisco routers have the Cisco IOS HTTP server enabled by default, to
allow CRWS or SDM to communicate with the router. With either CRWS or
SDM installed at shipping, the routers configuration will have a default
username and password that is used to access the router via the HTTP web
interface.
The following Cisco routers, whose configurations have been based on the
default IOS configuration shipped with any version of CRWS prior to
version 3.3.0 build 31, may be affected by this attack methodology if the
default username and password have not been removed:
* Cisco 806
* Cisco 826
* Cisco 827
* Cisco 827H
* Cisco 827-4v
* Cisco 828
* Cisco 831
* Cisco 836
* Cisco 837
* Cisco SOHO 71
* Cisco SOHO 76
* Cisco SOHO 77
* Cisco SOHO 77H
* Cisco SOHO 78
* Cisco SOHO 91
* Cisco SOHO 96
* Cisco SOHO 97
The following Cisco routers, whose configurations have been based on the
default IOS configuration shipped with any version of SDM prior to
version 2.3.3, may be affected by this attack methodology if the default
username and password have not been removed.
For details regarding which units have SDM default configurations enabled
at shipping, please consult Table 4: 'Ordering and Factory Shipping
Options for Cisco SDM' at:
http://www.cisco.com/en/US/products/sw/secursw/ps5318/products_data_sheet0900aecd800fd118.html
+-----------------------------------------------------------------------+
| Cisco SDM-Supported Routers | Cisco SDM-Supported Cisco IOS Releases |
+------------------------------+----------------------------------------+
| Cisco SB101 | |
| Cisco SB106 | 12.3(8)YG, 12.4(2)T or later releases |
| Cisco SB107 | |
+------------------------------+----------------------------------------+
| | 12.2(13)ZH or later releases |
| Cisco 831 | 12.3(2)XA or later releases |
| Cisco 837 | 12.3(2)T or later releases |
| | 12.4(2)T or later releases |
+------------------------------+----------------------------------------+
| | 12.2(13)ZH or later releases |
| | 12.3(2)XA or later releases |
| Cisco 836 | 12.3(4)T or later releases |
| | 12.4(2)T or later releases |
+------------------------------+----------------------------------------+
| Cisco 851 | 12.3(8)YI |
| Cisco 857 | 12.4(2)T or later releases |
+------------------------------+----------------------------------------+
| Cisco 871 | |
| Cisco 876 | 12.3(8)YI |
| Cisco 877 | 12.4(2)T or later releases |
| Cisco 878 | |
+-----------------------------------------------------------------------+
| | 12.2(13)ZH or later releases |
| | 12.3(2)XA or later releases |
| | (Cisco SDM does not support Cisco IOS |
| Cisco 1701 | release 12.3(2)XF.) |
| | |
| | 12.3(4)T or later releases |
| | 12.4(2)T or later releases |
+------------------------------+----------------------------------------+
| | 12.2(15)ZL or later releases |
| Cisco 1711 | 12.3(2)XA or later releases |
| Cisco 1712 | (Cisco SDM does not support Cisco IOS |
| | release 12.3(2)XF.) |
| | 12.4(2)T or later releases |
+------------------------------+----------------------------------------+
| | 12.2(13)ZH or later releases |
| | 12.3(2)XA or later releases |
| Cisco 1710 | (Cisco SDM does not support Cisco IOS |
| Cisco 1721 | release 12.3(2)XF.) |
| Cisco 1751 | 12.2(13)T3 or later releases |
| Cisco 1751-v | 12.3(2)T or later releases |
| Cisco 1760 | 12.3(1)M or later releases |
| Cisco 1760-v | 12.2(15)ZJ3 (not available for the |
| | Cisco 1710 or Cisco 1721) |
| | 12.4(2)T or later releases |
+-----------------------------------------------------------------------+
| Cisco 1801 | |
| Cisco 1802 | 12.3(8)YI |
| Cisco 1803 | 12.4(2)T or later releases |
| Cisco 1811 | |
+------------------------------+----------------------------------------+
| Cisco 1812 | 12.3(8)YH or later releases |
| | 12.4(2)T or later releases |
+------------------------------+----------------------------------------+
| Cisco 1841 | 12.3(8)T4 or later releases |
| | 12.4(2)T or later releases |
+------------------------------+----------------------------------------+
| Cisco 2610XM | |
| Cisco 2611XM | 12.2(11)T6 or later releases |
| Cisco 2620XM | 12.3(2)T or later releases |
| Cisco 2621XM | 12.3(1)M or later releases |
| Cisco 2650XM | 12.3(4)XD |
| Cisco 2651XM | 12.2(15)ZJ3 |
| Cisco 2691 | 12.4(2)T or later releases |
+------------------------------+----------------------------------------+
| Cisco 2801 | |
| Cisco 2811 | 12.3(8)T4 or later releases |
| Cisco 2821 | 12.4(2)T or later releases |
| Cisco 2851 | |
+------------------------------+----------------------------------------+
| | 12.2(11)T6 or later releases |
| | 12.2(11)T6 or later releases |
| Cisco 3640 | 12.3(2)T or later releases |
| Cisco 3661 | 12.3(1)M or later releases |
| Cisco 3662 | 12.3(4)XD |
| | 12.2(15)ZJ3 |
| | 12.4(2)T or later releases |
+------------------------------+----------------------------------------+
| Cisco 3620 | 12.2(11)T6 or later releases |
| | 12.3(1)M or later releases |
+------------------------------+----------------------------------------+
| | 12.2(13)T3 or later releases |
| | 12.3(2)T or later releases |
| | 12.3(1)M or later releases |
| Cisco 3640A | 12.3(4)XD |
| | 12.2(15)ZJ3 |
| | 12.4(2)T or later releases |
+------------------------------+----------------------------------------+
| | 12.2(11)T6 or later releases |
| | 12.3(2)T or later releases |
| Cisco 3725 | 12.3(1)M or later releases |
| Cisco 3745 | 12.3(4)XD |
| | 12.2(15)ZJ3 |
| | 12.4(2)T or later releases |
+------------------------------+----------------------------------------+
| Cisco 3825 | 12.3(11)T or later releases |
| Cisco 3845 | 12.4(2)T or later releases |
+------------------------------+----------------------------------------+
| | 12.3(2)T or later releases |
| Cisco 7204VXR | 12.3(1)M or later releases |
| Cisco 7206VXR | 12.4(2)T or later releases |
| | Cisco SDM does not support B, E, or |
| | S train releases on the Cisco 7000 |
| | routers. |
+------------------------------+----------------------------------------+
| | 12.3(2)T or later releases |
| | 12.3(3)M or later releases |
| Cisco 7301 | 12.4(2)T or later releases |
| | Cisco SDM does not support B, E, or |
| | S train releases on the Cisco 7000 |
| | routers. |
+------------------------------+----------------------------------------+
Any of the previously listed Cisco routers whose IOS configuration is not
based on the default IOS configuration shipped with either the CRWS or
SDM application are not affected by this attack methodology.
Additional Information
======================
The Cisco IOS HTTP server is enabled by default on several Cisco IOS
devices for use with web-based configuration tools such as CRWS or SDM.
If those products are configured via either CRWS or SDM, administrators
will be prompted to change the default administrative credentials when
they try to configure the device for the first time (earlier versions of
CRWS did NOT request the changing of default credentials. For details
see: http://www.cisco.com/warp/public/707/cisco-sa-20060712-crws.shtml).
If the device first-time configuration is done using the command line
interface (CLI) and not through the web-based interface, the
administrator will NOT be prompted to change the default credentials nor
will they be removed automatically by the device itself. Not changing
or removing the default credentials leaves the device open to potential
exploitation, as described in Symantec's research paper.
Cisco introduced a new security feature via Cisco Bug ID: CSCse65910,
per which Cisco IOS has added a new keyword 'one-time' to the usernames.
User credentials configured on the device and using the 'one-time'
option can only be used once when the user connects to the router
through a virtual terminal (vty) line or Console port. Cisco IOS will
remove this credential from the running configuration after the initial
use. The administrator of the device, should then add a username with
a privilege level of 15 using the following command:
username 'myuser' privilege 15 secret 0 'mypassword'
Replace 'myuser' and 'mypassword' with the username and password you
want to use, and save the changes to the startup configuration.
SDM takes advantage of this Cisco IOS feature from SDM version 2.3.3
or later. This feature is documented on Cisco Bug Toolkit as Cisco
Bug ID: CSCek35024.
Cisco encourages customers to change any default credentials being used
by those device managers during first use.
Recommended Workarounds
=======================
To help mitigate the risks associated with the type of attack presented
in the Symantec paper, Cisco recommends that any default credentials
shipped with the device (username/password combinations) be completely
removed. If the Cisco router is not configured nor monitored by either
SDM or CRWS, and if the IOS HTTP server is not required in your
environment, it should be disabled.
Additional mitigations that can be deployed on Cisco devices within the
network are available in the Cisco Applied Intelligence companion
document for this response:
http://www.cisco.com/warp/public/707/cisco-air-20070215-http.shtml
* Workaround 1 - Disabling the Cisco IOS HTTP Server Functionality
Customers who do not use the CRWS or SDM application
device-management tools and not requiring the functionality
provided by the Cisco IOS HTTP server can disable it by adding the
following commands to their device configuration:
no ip http server
no ip http secure-server
The second command might return an error message if the Cisco IOS
version installed and running on the device does not support the SSL
functionality. This error message is harmless and can be safely
ignored.
* Workaround 2 - Enabling Authentication of Requests to the Cisco IOS
HTTP Server by Configuring an Enable Password
Customers who are using the CRWS or SDM applications
device-management tools, or requiring the functionality provided by
the Cisco IOS HTTP server should configure an authentication
mechanism for access to the Cisco IOS HTTP server interface. One
option is to configure an enable secret or enable password. The
enable password is the default authentication mechanism used by the
Cisco IOS HTTP server if no other method has been configured.
To configure authentication of the http access via the enable
secret password, add the following commands to the device
configuration:
enable secret 'mypassword'
ip http authentication enable
Replace 'mypassword' with a strong password of your choosing. For
guidance on strong passwords, please refer to your site security
policy. The document entitled 'Cisco IOS Password Encryption Facts'
available at
http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a00801d7efa.shtml,
explains the differences between the enable secret and the enable
password commands.
* Workaround 3 - Enabling Authentication of Requests to the Cisco IOS
HTTP Server by using an Authentication Mechanism
Other than the Default
Instead of configuring authentication using the default method as
described in Workaround 2, configure an authentication mechanism
for access to the Cisco IOS HTTP server via other mechanisms. Such
authentication mechanisms can be the local user database, or a
previously defined Authentication, Authorization and Accounting
(AAA) method.
As the procedure to enable an authentication mechanism for the
Cisco IOS HTTP server varies across Cisco IOS releases and other
additional factors, no example will be provided.
Customers looking for information about how to configure an
authentication mechanism for the Cisco IOS HTTP server are
encouraged to read the document entitled 'AAA Control of the IOS
HTTP Server', available at
http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a008069bdc5.shtml.
Note: The only authentication method tested and supported for use
with the CRWS application is the local user database. No
other methods (including the use of an external RADIUS or
TACACS+ server) are supported.
References
==========
* Definition of Pharming
The definition of pharming from:
http://www.cisco.com/web/about/security/intelligence/mysdn-social-engineering.html
is shown below:
Pharming also takes advantage of false websites, by redirecting
users to the false site as they attempt to access a legitimate
website. This redirection, also known as domain spoofing, can be
perpetrated through an e-mailed virus that lies dormant on a PC
until the user enters a specific URL, or by poisoning a domain name
system (DNS) directory. A DNS translates web and e-mail addresses
into numeric strings. In a poisoned DNS, the links that associate
web addresses with numeric strings are changed so users are
directed to a false website when they enter a specific URL. Any
secure information entered into the false website, such as a user
name and password, is captured by hackers.
* Improving Security on Cisco Routers
The document http://www.cisco.com/warp/public/707/21.html is an
informal discussion of some Cisco configuration settings that
network administrators should consider changing on their routers,
especially on their border routers, in order to improve security.
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
Revision History
================
+-----------------------------------------------------------------------+
| Revision 1.0 | 2007-FEB-15 | Initial Initial public release. |
+-----------------------------------------------------------------------+
Cisco Security Procedures
=========================
Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and registering
to receive security information from Cisco, is available on Cisco's
worldwide website at
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html.
This includes instructions for press inquiries regarding Cisco security
notices. All Cisco security advisories are available at
http://www.cisco.com/go/psirt.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (SunOS)
iD8DBQFF1Jxb8NUAbBmDaxQRAiOPAJ9om3FONUlIC7tINLCrfVFELSb6+QCeLjYd
g+mReh7B0gZpdYjIzZs+uKo=
=pFEo
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists