|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cisco Security Advisory:
DOCSIS Read-Write Community String Enabled in Non-DOCSIS Platforms
Document ID: 71255
Advisory ID: cisco-sa-20060920-docsis
http://www.cisco.com/warp/public/707/cisco-sa-20060920-docsis.shtml
Revision 1.0
For Public Release 2006 September 20 1600 UTC (GMT)
- -----------------------------------------------------------------------
Contents
=======
Summary
Affected Products
Details
Impact
Software Version and Fixes
Workarounds
Obtaining Fixed Software
Exploitation and Public Announcements
Status of this Notice: FINAL
Distribution
Revision History
Cisco Security Procedures
- -----------------------------------------------------------------------
Summary
======
A vulnerability exists in certain Cisco IOS software release trains
running on the Cisco IAD2400 series, 1900 Series Mobile Wireless Edge
Routers and Cisco VG224 Analog Phone Gateways. Vulnerable versions may
contain a default hard-coded Simple Network Management Protocol (SNMP)
community string when SNMP is enabled on the device. The default
community string is a result of inadvertently identifying these devices
as supporting Data Over Cable Service Interface Specification (DOCSIS)
compliant interfaces. The consequence of this error is that an
additional read-write community string may be enabled if the device is
configured for SNMP management, allowing a knowledgeable attacker the
potential to gain privileged access to the device.
Cisco is making free software available to address this vulnerability
for affected customers. There are workarounds available to mitigate the
effects of the vulnerability.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20060920-docsis.shtml.
Affected Products
================
The following products are affected if they run a vulnerable release of
Cisco IOS software with the SNMP server enabled. Any version of Cisco
IOS software prior to the versions listed in the Fixed Software section
below may be vulnerable.
To determine if the SNMP server is running on your device and the
default community string is present, issue the "show snmp community"
command while in enable mode at the prompt and look for output similar
to:
Router#show snmp community
Community name: cable-docsis
Community Index: cisco0
Community SecurityName: cable-docsis
storage-type: read-only active
If the SNMP server is disabled on your device, output similar to the
following will be returned:
Router#show snmp community
%SNMP agent not enabled
To determine the software running on a Cisco product, log in to the
device and issue the "show version" command to display the system banner.
Cisco IOS software will identify itself as "Internetwork Operating
System Software" or simply "IOS". On the next line of output, the image
name will be displayed between parentheses, followed by "Version" and
the IOS release name. Other Cisco devices will not have the "show version"
command or will give different output.
The following example identifies a Cisco product running IOS release
12.2(15)MC2 with an installed image name of MWR1900-I-M:
Cisco Internetwork Operating System Software
IOS (tm) 1900 Software (MWR1900-I-M), Version 12.2(15)MC2, EARLY DEPLOYMENT RELEASE SOFTWARE (fc1)
Additional information about Cisco IOS release naming can be found at
http://www.cisco.com/warp/public/620/1.html.
Vulnerable Products
+------------------
Cisco devices that may be running with affected Cisco IOS software
releases include:
* Cisco IAD2430 Integrated Access Device
* Cisco IAD2431 Integrated Access Device
* Cisco IAD2432 Integrated Access Device
* Cisco VG224 Analog Phone Gateway
* Cisco MWR 1900 Mobile Wireless Edge Router
* Cisco MWR 1941 Mobile Wireless Edge Router
Products Confirmed Not Vulnerable
+--------------------------------
* Cisco IAD2420 Integrated Access Device
* Cisco IAD2421 Integrated Access Device
* Cisco IAD2423 Integrated Access Device
* Cisco IAD2424 Integrated Access Device
No other Cisco products are currently known to be affected by this
vulnerability.
Details
======
Implementation of the Data Over Cable Service Interface Specification
(DOCSIS) standards allow for data transmission over physical media used
by cable television providers. Accordingly, RFC 2669
defines the DOCSIS Cable Device MIB, better known as the
DOCS-CABLE-DEVICE-MIB, for which support is required in order to be
considered DOCSIS compliant. That MIB defines the table,
docsDevNmAccessTable, as:
"This table controls access to SNMP objects by network
management stations. If the table is empty, access
to SNMP objects is unrestricted. This table exists only
on SNMPv1 or v2c agents and does not exist on SNMPv3
agents. See the conformance section for details.
Specifically, for v3 agents, the appropriate MIBs and
security models apply in lieu of this table."
In order to comply with the DOCSIS standard and to avoid unrestricted
access to SNMP objects, Cisco devices which support DOCSIS contain a
read-write community string, "cable-docsis".
Inclusion of this SNMP community string is intended only for
DOCSIS-compliant cable-capable devices. A vulnerability exists in the
inadvertent enabling of this community string in Cisco IOS release
trains running on the affected platforms.
Customers running vulnerable versions of Cisco IOS software on those
platforms may be unaware of the additional read-write community string.
This vulnerability is documented in Cisco Bug ID CSCsb04965
on the Cisco IAD2400 series and Cisco VG224 Analog Phone Gateways and
as CSCsb06658 on the 1900 Series Mobile Wireless Edge Routers.
Impact
=====
Successful exploitation of the vulnerability may result in full control
of the device.
Software Version and Fixes
=========================
When considering software upgrades, also consult
http://www.cisco.com/go/psirt and any subsequent advisories to
determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the
devices to be upgraded contain sufficient memory and that current
hardware and software configurations will continue to be supported
properly by the new release. If the information is not clear, contact
the Cisco Technical Assistance Center ("TAC") or your contracted
maintenance provider for assistance.
Each row of the Cisco IOS software table (below) describes a release
train and the platforms or products for which it is intended. If a
given release train is vulnerable, then the earliest possible releases
that contain the fix (the "First Fixed Release") and the anticipated
date of availability for each are listed in the "Rebuild" and
"Maintenance" columns. A device running a release in the given train
that is earlier than the release in a specific column (less than the
First Fixed Release) is known to be vulnerable. The release should be
upgraded at least to the indicated release or a later version (greater
than or equal to the First Fixed Release label).
For more information on the terms "Rebuild" and "Maintenance," consult
the following URL: http://www.cisco.com/warp/public/620/1.html.
+-----------------------------------------------------------------------------+
| Major Release | Availability of Repaired Releases |
|------------------------------+----------------------------------------------|
| Affected 12.2-Based Release | Rebuild | Maintenance |
|------------------------------+---------------------+------------------------|
| 12.2MC | 12.2(15)MC2c | |
|------------------------------+----------------------------------------------|
| 12.2ZJ | Vulnerable; migrate to 12.3(4)T13 or later |
|------------------------------+----------------------------------------------|
| Affected 12.3-Based Release | Rebuild | Maintenance |
|------------------------------+---------------------+------------------------|
| | 12.3(4)T13 | |
| |---------------------+------------------------|
| | 12.3(7)T11 | |
| |---------------------+------------------------|
| 12.3T | 12.3(8)T10 | |
| |---------------------+------------------------|
| | 12.3(11)T6 | |
| |----------------------------------------------|
| | Vulnerable; for 12.3(14), migrate to |
| | 12.4(1b) or later |
|------------------------------+----------------------------------------------|
| 12.3XD | Vulnerable; migrate to 12.3(7)T11 or later |
|------------------------------+----------------------------------------------|
| 12.3XX | Vulnerable; migrate to 12.4(1b) or later |
|------------------------------+----------------------------------------------|
| 12.3XY | Vulnerable; migrate to 12.4(1b) or later |
|------------------------------+----------------------------------------------|
| 12.3YA | Vulnerable; contact TAC |
|------------------------------+----------------------------------------------|
| 12.3YD | Vulnerable; migrate to 12.4(2)T5 or later |
|------------------------------+----------------------------------------------|
| 12.3YF | Vulnerable; migrate to 12.3(14)YX or later |
|------------------------------+----------------------------------------------|
| 12.3YG | 12.3(14)YG5 | |
|------------------------------+----------------------------------------------|
| 12.3YH | Vulnerable; migrate to 12.4(2)T5 or later |
|------------------------------+----------------------------------------------|
| 12.3YI | Vulnerable; migrate to 12.4(2)T5 or later |
|------------------------------+----------------------------------------------|
| 12.3YJ | Vulnerable; migrate to 12.3(14)YQ8 or later |
|------------------------------+----------------------------------------------|
| 12.3YK | Vulnerable; migrate to 12.4(4)T or later |
|------------------------------+----------------------------------------------|
| 12.3YM | 12.3(14)YM8 | |
|------------------------------+---------------------+------------------------|
| 12.3YQ | 12.3(14)YQ8 | |
|------------------------------+----------------------------------------------|
| 12.3YS | Vulnerable; migrate to 12.4(4)T or later |
|------------------------------+----------------------------------------------|
| 12.3YT | Vulnerable; migrate to 12.4(4)T or later |
|------------------------------+----------------------------------------------|
| 12.3YU | Vulnerable; migrate to 12.4(2)XB or later |
|------------------------------+----------------------------------------------|
| Affected 12.4-Based Release | Rebuild | Maintenance |
|------------------------------+---------------------+------------------------|
| 12.4 | 12.4(1b) | 12.4(3) |
|------------------------------+---------------------+------------------------|
| 12.4MR | | 12.4(4)MR |
|------------------------------+---------------------+------------------------|
| 12.4T | 12.4(2)T5 | 12.4(4)T |
+-----------------------------------------------------------------------------+
Workarounds
==========
The effectiveness of any workarounds is dependent on specific customer
situations such as product mix, network topology, traffic behavior and
organizational mission. Due to the variety of affected products and
releases, customers should consult with their service provider or
support organization to ensure any applied workaround is the most
appropriate for use in the intended network before it is deployed.
The following workarounds should only be considered as a long term
solution if anti-spoofing methods consistently prevent spoofed source
attacks from entering the network and access-lists provided below are
configured on every potentially affected device.
Disable the SNMP Server
+----------------------
If the SNMP server is not used for any legitimate purposes on the
device, it is a best practice to disable it by issuing the following
commands in configure mode:
no snmp-server
Removing the public community string with the configure command
"no snmp-server community