Lucene search

K
certCERTVU:210876
HistoryMay 02, 2007 - 12:00 a.m.

Cisco PIX and ASA authentication bypass vulnerability

2007-05-0200:00:00
www.kb.cert.org
13

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.185 Low

EPSS

Percentile

96.3%

Overview

The Cisco ASA and PIX firewalls contain an authentication bypass vulnerability. This vulnerability may allow a remote attacker to gain unauthorized access to the internal network or firewall.

Description

The Cisco Adaptive Security Appliance (ASA) is firewall that includes routing and intrusion prevention system (IPS) features. The Cisco PIX is a stateful firewall. The Cisco ASA and PIX firewalls include the ability to use LDAP and AAA servers to authenticate remote users or terminate VPN connections.

Per Cisco Security Advisory cisco-sa-20070502-asa:
Cisco ASA and PIX devices leveraging LDAP AAA servers for authentication of terminating L2TP IPSec tunnels or remote management sessions may be vulnerable to an authentication bypass attack. See the following bullets for more details:

* _Layer 2 Tunneling Protocol (L2TP)  

Devices terminating L2TP IPSec tunnels must be configured to use LDAP in conjunction with CHAP, MS-CHAPv1, or MS-CHAPv2 authentication protocols to be vulnerable. If LDAP authentication is used in conjunction with PAP, the device is not vulnerable to the LDAP L2TP authentication bypass.
_
* Remote Management Access
Cisco ASA and PIX devices leveraging LDAP AAA servers for authentication of management sessions (telnet, SSH and HTTP) may be vulnerable to an authentication bypass attack. Access for management sessions must be explicitly enabled and is limited to the defined source IP address within the device configuration.

Impact

A remote, unauthenticated attacker may be able to gain access to internal resources, or gain direct access to the firewall.


Solution

UpgradeCisco has released an update to address this vulnerability. See the Software Versions and Fixes section of Cisco Security Advisory cisco-sa-20070502-asa for more details.


Restrict access

Restricting access to the firewall’s telnet, SSH and HTTP interfaces to trusted hosts by using IP access control lists may mitigate this vulnerability.


Vendor Information

210876

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Cisco Systems, Inc. __ Affected

Updated: May 02, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

See <http://www.cisco.com/en/US/products/products_security_advisory09186a0080833166.shtml#fixes&gt; for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23210876 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Cisco for information that used in this report.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-2462
Severity Metric: 2.43 Date Public:

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.185 Low

EPSS

Percentile

96.3%