|
Vulnerability Cisco Affected Cisco Cache Engine 2050, Release 1.0 through 1.7.6. Cisco Cache Engine 500, Release 2.0.1 through 2.0.2. Description Following is based on Cisco Security Advisory. A vulnerability exists that could allow an unauthorized person to substitute arbitrary material in place of legitimate content for a specified website. This arbitrary content would be viewable only by users of the affected (or "polluted") Cache Engine. This vulnerability has Cisco bug ID CSCdm63310. A second vulnerability exists that could allow unauthorized persons to view performance information via the web interface of the Cache Engine. This vulnerability has Cisco bug ID CSCdp20180. A third vulnerability existed that allowed a null username and password pair to be accepted as valid authentication credentials. This vulnerability has Cisco bug ID CSCdj56294. For Cisco bug ID CSCdm63310: ============================ Content can be stored on the Cisco Cache Engine, provided a well-known host name, and clients behind that Cisco Cache Engine will only receive the Cisco Cache Engine content for that well-known host name. This would allow an opportunistic content provider to populate a Cisco Cache Engine with content of their choosing, yet make it appear as any other host name was serving this content. The clients using this "polluted" cache engine would be the only ones to see this tainted content, causing confusion and service disruption. Version 2.0.3 of the Cisco Cache Engine provides additional authentication to verify that the hostname provided actually belongs to the site providing the content. For Cisco bug ID CSCdp20180: ============================ Though the Cache Engine web administration pages request authentication, a script can be written to bypass the authentication request and gain access to the performance statistics without authentication. This problem has been fixed by adding extra security checks to verify the Java monitor applet that provides the performance statistics has been properly authenticated. For Cisco bug ID CSCdj56294: ============================ This issue would permit unauthorized persons to alter files on the Cache Engine, ranging from blocked site lists to alternate software versions. Very few sites were provided versions affected by this issue. These vulnerabilities were all originally reported to Cisco by separate customers. Cisco knows of no public announcements of these vulnerabilities, nor have any malicious uses been reported to Cisco. A simple HTML script is needed to effectively exploit CSCdp20180. Although Cisco knows of no program available to the public specifically for this purpose, writing such a script would require little effort, and a basic understanding of HTML and Java code. Solution If you are using a Cisco Cache Engine that has not been upgraded to version 2.0.3, you are vulnerable to the first two issues (CSCdm63310 and CSCdp20180). If you are running a Cache Engine that has not been upgraded to version 1.5, you are vulnerable to all three issues (CSCdm63310, CSCdp20180, and CSCdj56294). All issues are fixed in the Cisco Cache Engine 500, Release 2.0.3 or later. All issues are fixed in Cisco Cache Engine version 2.0.3. CSCdj56294 is resolved in Cisco Cache Engine version 1.5, and higher. However, due to issues CSCdp20180 and CSCdm63310, it is strongly recommended that customers upgrade to Cisco Cache Engine version 2.0.3. Software version 2.0.3 will only apply to the following Cisco Cache Engine Hardware platforms: CE-550, CE-505, and CE-550-DS3. The CE-2050 chassis cannot be upgraded to version 2.0.3, and you will need to contact the Cisco TAC for assistance as detailed in the "Getting Fixed Software" section of this notice. If you do not know which hardware chassis of the Cisco Cache Engine you have, please contact the Cisco TAC at one of the telephone numbers listed in the "Cisco Security Procedures" section of this notice. Workarounds to prevent an attacker from taking advantage of the vulnerability described in CSCdm63310 include disabling the Cisco Cache Engine or specifying a strict list of permitted sites that would restrict clients to a list of known, valid websites. The procedure for enabling URL restriction is detailed in Cache Engine documentation version 1.7 at the following link: http://www.cisco.com/univercd/cc/td/doc/product/iaabu/webcache/ce17/ver17/wc17man.htm Workarounds for both CSCdp20180 and CSCdj56294 include other means of limiting access to both web based management and FTP ports on the Cache Engine, such as firewalls or access lists on routers to limit traffic to those ports. It is strongly recommended to upgrade to version 2.0.3 of the Cisco Cache Engine.