Lucene search

K
certCERTVU:639507
HistoryOct 12, 2001 - 12:00 a.m.

Cisco PIX Firewall Manager stores enable password in plain text

2001-10-1200:00:00
www.kb.cert.org
8

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.3%

Overview

A vulnerability exists in the way the Cisco Pix Firewall Manager stores authentication credentials which could allow local attackers to have read access to the enable password for the Cisco Pix Firewall.

Description

The PIX Firewall Manager (PFM) is a software package designed to allow system administrators to remotely configure Cisco Pix Firewalls from a Windows NT workstation. When the PIX Firewall Manager (PFM) connects to a Cisco Pix Firewall, the Firewall Manager stores the ‘enable’ password (the password used to gain access to the firewall) in plaintext on the Windows NT workstation running the PFM software. Additionally, the password is stored in a location that is accessible to all users on the workstation. If the workstation is compromised, it’s trivial to retrieve the password and gain access to the Pix Firewall.


Impact

An attacker can gain administrative access to a Cisco Pix Firewall. Once the attacker has obtained this access, he or she can do anything the legitimate firewall administrator could do. It is important to note that in order to exploit this vulnerability, an intruder must first obtain access to a local user account on the workstation where the PIX Firewall Manager (PFM) resides. This may be a difficult task, as the management station is most likely on the internal network. However, it is important to understand that intruders may exist on the inside of your network perimeter.


Solution


Use the PIX Device Manager instead of the PIX Firewall Manager (PFM). Additionally, make sure that you are running software version 6.0 or later on your Pix Firewall.


Vendor Information

639507

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Cisco __ Affected

Updated: October 31, 2001

Status

Affected

Vendor Statement

The Cisco PFM (PIX Firewall Manager ) utility has been deprecated, all engineering effort for PIX device-level management is currently focused on PIX Device Manager (PDM).

The PFM utility is only for use from inside the firewall, and is expected to be running on a well protected host. The management host running PFM is intended to be an inside, secured host such that unauthorized personnel would not have access to the PFM log. A management device that is compromised will allow a determined attacker many options for information disclosure. For example, installation of a keystroke recorder would allow an attacker to easily gain further information, no matter how it was protected within the filesystem and internal structure of the device.

In summary, we consider the report to be valid, however it is not something we will repair in the PFM.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23639507 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Florencio Umel Jr. of Novacoast International Inc. has been publicly credited with discovering this vulnerability.

This document was written by Ian A. Finlay.

Other Information

CVE IDs: CVE-2001-1098
Severity Metric: 6.28 Date Public:

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

0.0004 Low

EPSS

Percentile

5.3%

Related for VU:639507