TUCoPS :: Cisco :: cisco6~6.htm

Cisco SN 5420 Storage Routers DoS, unrestricted low level access
Vulnerability

    Cisco

Affected

    Cisco SN 5420 Storage Routers

Description

    Following  is   based  on   a  Cisco   Security  Advisory.     Two
    vulnerabilities  have  been  discovered  in  Cisco SN 5420 Storage
    Router software release  up to and  including 1.1(3).   One of the
    vulnerabilities  can  cause  Denial-of-Service  attack.  The other
    allows unrestricted low level access to the SN 5420.

    There is no workaround for these vulnerabilities.  It is  possible
    to mitigate them by blocking access  to ports 513 and 8023 on  the
    network edge.  The vulnerabilities are documented in Cisco Bug IDs
    CSCdu27529 and CSCdu27514.  No other Cisco product is affected  by
    these vulnerabilities.

    Cisco SN 5420 Storage Routers  running software release up to  and
    including  1.1(3)  are  affected   by  the  vulnerabilities.    To
    determine your software release, type "show system" at the command
    prompt.   No   other  Cisco   products  are   affected  by   these
    vulnerabilities.

    CSCdu27529
    ==========
    You  can  reboot  the  device  by  rapidly  establishing  multiple
    connections  to   TCP  port   8023.    By  repeatedly   exploiting
    CSCdu27529,  it  is  possible  to  prevent  a  user from accessing
    storage, thus causing Denial-of-Service attack.

    CSCdu27514
    ==========
    When logging into SN 5420 using "rlogin" or when connecting to the
    port 8023 from the GigabitEthernet or management interface, a user
    can access a developer's' shell of  the SN 5420.  The user  is not
    asked for a password.  No other authorization is performed.   This
    shell  is  used  during  developing  for  testing.   Starting with
    software  releases  1.1(4),  this  capability  is removed from the
    software.

    When  logged  into  a  developer's  shell  (CSCdu27514), users can
    execute debug  commands, start  and stop  processes, and interfere
    with the normal process execution.   Users who are logged in  such
    a  manner  and  all  commands  executed  by them are not logged or
    shown using the  standard logging mechanism  of the Cisco  SN 5420
    Storage Router.

Solution

    The  vulnerabilities  are  fixed  in  the  release  1.1(4)  of the
    software, which is  availabe on CCO.   There is no  workaround for
    these  vulnerabilities.   It  is  possible  to  mitigate  them  by
    blocking access to ports 513 and 8023 on the network edge.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH