|
Vulnerability CSS Affected Cisco CSS switch (Arrowpoint) 11050, 11150 and 11800 Description Following is based on a Cisco Security Advisory. The Cisco Content Services (CSS) switch product, also known as Arrowpoint, has a security vulnerability in a previous release that allows non-privileged users to escalate their privilege level, permitting them configuration ability on affected units. This vulnerability can only be exercised from a valid user account. To remove the vulnerability, Cisco is offering free software upgrades to revision 4.01B19s for all affected platforms. This defect is documented as Cisco bug ID CSCdt32570. The CSS switch is also known as the Arrowpoint product, and runs the Cisco WebNS Software. Cisco CSS 11050, CSS 11150, and CSS 11800 hardware platforms are affected by this vulnerability. No other Cisco products are affected by this vulnerability. If the switch is running a version prior to 4.01B19s, then it is affected and should be upgraded as soon as possible. You may type version at the command line to find out software version number. A non-privileged user can issue a series of keystrokes to enter the debug mode, and from that mode can gain administrative access. This vulnerability allows a non-privileged user to become a super-user, allowing unauthorized access to important files such as the configuration files, and directory structure information. If access to the command line interface is well protected and restricted, these vulnerabilities are minimized. Cisco Bug ID CSCdt32570 describes this vulnerability. Solution CSCdt32570 is resolved in version 4.01B19s of Cisco WebNS software. Non-privileged users can no longer enter debug mode. Access control lists can be applied to restrict access to the Cisco CSS device, as well as additional firewall or access lists to restrict connection to the management interface. Access control lists also affect traffic to the Virtual interface of the Cisco CSS device, so must be applied with care. For further details on configuring access lists, please refer to the product documentation: http://www.cisco.com/univercd/cc/td/doc/product/webscale/css/bsccfggd/profiles.htm http://www.cisco.com/univercd/cc/td/doc/product/webscale/css/advcfggd/sgacleql.htm Additionally, the use of SSH to prevent snooping of the management traffic to the device is encouraged. Telnet service can also be disabled. This is not a feasible option for many customers in a co-location environment, but it is included in this section for customers that may have the ability to implement this configuration: CS150(config)# telnet access disabled