TUCoPS :: Cisco :: cisco63.htm

Cisco SN 5420 Storage Routers Denial of Service
COMMAND

    Cisco

SYSTEMS AFFECTED

    Cisco SN 5420 Storage Routers

PROBLEM

    Following  is   based  on   a  Cisco   Security  Advisory.     Two
    vulnerabilities  have  been  discovered  in  Cisco SN 5420 Storage
    Router software release  up to and  including 1.1(3).   One of the
    vulnerabilities  can  cause  Denial-of-Service  attack.  The other
    allows unrestricted low level access to the SN 5420.

    The vulnerabilities are documented in Cisco Bug IDs CSCdu27529 and
    CSCdu27514.   Cisco  SN  5420  Storage  Routers  running  software
    release  up  to   and  including  1.1(3)   are  affected  by   the
    vulnerabilities.  To determine  your software release, type  "show
    system"  at  the  command  prompt.   No  other  Cisco products are
    affected by these vulnerabilities.

    CSCdu27529
    ==========
    You  can  reboot  the  device  by  rapidly  establishing  multiple
    connections  to   TCP  port   8023.    By  repeatedly   exploiting
    CSCdu27529,  it  is  possible  to  prevent  a  user from accessing
    storage, thus causing Denial-of-Service attack.


    CSCdu27514
    ===========
    When logging into SN 5420 using "rlogin" or when connecting to the
    port 8023 from the GigabitEthernet or management interface, a user
    can access a developer's' shell of  the SN 5420.  The user  is not
    asked for a password.  No other authorization is performed.   This
    shell is used during developing for testing.

    Starting  with  software  releases  1.1(4),  this  capability   is
    removed from the software.

    When  logged  into  a  developer's  shell  (CSCdu27514), users can
    execute debug  commands, start  and stop  processes, and interfere
    with the normal process execution.   Users who are logged in  such
    a  manner  and  all  commands  executed  by them are not logged or
    shown using the  standard logging mechanism  of the Cisco  SN 5420
    Storage Router.

SOLUTION

    There is no workaround for these vulnerabilities.  It is  possible
    to mitigate them by blocking access  to ports 513 and 8023 on  the
    network edge.

    The  vulnerabilities  are  fixed  in  the  release  1.1(4)  of the
    software, which is availabe on CCO.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH