This article is more than 1 year old
Cisco visits top clients to warn of SNMP bugs
Door for possible DoS exploits
Cisco has publicly disclosed a number of potentially devastating security vulnerabilities affecting the operating system used by its routers and switches.
In the most serious case, flaws in the way Cisco's Internetwork Operating System (IOS) implements Simple Network Management Protocol (SNMP), a standard for the remote administration of network devices, could leave the door open to fresh types of denial of service attacks.
Multiple versions of IOS contain several independent, but related, vulnerabilities involving the unexpected creation and exposure of SNMP community strings, which define how operating variables can be viewed or modified on a networked device.
"Knowledge of read-write community strings allows remote configuration of affected devices without authorisation, possibly without the awareness of the administrators of the device and resulting in a failure of integrity and a possible failure of availability," Cisco discloses in a security notice, available here.
Roy Hills, testing development director at security testing firm NTA Monitor, said: "What Cisco has said indicates there's potential for denial of service attack, the question is how easy this would be. Any real damage possible with the vulnerability depends on the scope of access and whether an exploit became posted."
According to Hills, the vulnerability is a "major issue" because so many devices will need to be modified, a particular headache for service providers.
The vulnerability affects almost all Cisco routers and switches, but not its voice gateways, optical switches or firewalls.
Cisco is taking the issue very seriously and took the highly unusual step of visiting its most important customers to discuss the issue beforehand, including one Register reader who told us he received a short-notice visit from three senior Cisco techies last week.
To fix the bugs, Cisco is offering free software upgrades for various versions of its operating system, all of which are affected by the problem. Pending the availability of some of these fixes, Cisco has suggested a workaround involving blocking SNMP access.
Separately, Cisco has warned that IOS contains a flaw which permits the successful prediction of TCP Initial Sequence Numbers; this makes it easier to forge messages that could allow crackers to break into systems.
However, exploitation of the vulnerability is only possible for TCP sessions which originate or terminate on the affected Cisco device itself, not on traffic flowing through it. More information on this bug is available here. ®