|
Vulnerability Cisco Affected Cisco Content Service Switch 11000 Series Description Following is based on a Cisco Security Advisory. The Cisco Content Service Switch (CSS) 11000 series switches do not enforce the correct restrictions for a non privileged user opening an FTP connection to them. All users with valid accounts can use the GET and PUT commands to read and write any file on the system. This vulnerability results in users gaining access to secure data. This vulnerability is documented as Cisco bug ID CSCdt64682. Affected are the CSS 11000 series switches (formerly known as Arrowpoint), consist of the CSS 11050, CSS 11150 and CSS 11800 hardware platforms. They run the Cisco WebNS Software. All switches running the following WebNS software revisions are affected by this vulnerability * earlier than 4.01B23s * earlier than 4.10B13s No other Cisco product is currently known to be affected by this vulnerability. A non privileged user (user account without administrative privileges) can open an FTP connection to a CSS 11000 series switch and use GET and PUT FTP commands, with no user level restrictions enforced. A non privileged user can gain access to files on the switch they normally would not have access to. This vulnerability can be minimized by restricting ftp access to the CSS 11000 series switch. Solution Don't configure non-privileged users on the switch (none are created by default). Use the restrict command to enable or disable FTP access to the CSS (FTP access is enabled by default): (config)# restrict ftp Access control lists can be applied to restrict FTP access to the Cisco CSS device. Access control lists also affect traffic to the Virtual interface of the Cisco CSS device, so must be applied with care. For further details on configuring access lists please refer to the product documentation: http://www.cisco.com/univercd/cc/td/doc/product/webscale/css/bsccfggd/profiles.htm http://www.cisco.com/univercd/cc/td/doc/product/webscale/css/advcfggd/sgacleql.htm This vulnerability has been fixed in the following Cisco WebNS software revisions * 4.01B23s or later * 4.10B13s or later