The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Bypassing Cisco SNMP Access Lists Using Spoofed SNMP Requests


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 8 Aug 2005 17:32:14 +0200
Subject: [NEWS] Bypassing Cisco SNMP Access Lists Using Spoofed SNMP Requests
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050808144739.AB85B5807@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Bypassing Cisco SNMP Access Lists Using Spoofed SNMP Requests
------------------------------------------------------------------------


SUMMARY

Under certain conditions, it is possible to bypass the SNMP ACL on Cisco 
routers and gain ANMP Read / Write privileges.

DETAILS

In order to gain R/W SNMP access on the router, the following conditions 
must exist:
a) RW community string is known
b) Access list policy is known
c) Access to the SNMP RW command will occur from the a.b.c.d network 
(External).
d) No access lists present on TFTP server address.

Under these conditions, if the server holds an ACL like:
access-list 1 permit 192.168.1.0 0.0.0.255
snmp-server community public RO
snmp-server community datest RW 1

By spoofing an SNMP packet, it is possible to bypass the ACL. The idea is 
to spoof a packet with a different source IP than the attacker has or more 
accurately, a source IP which is allowed by the Router SNMP ACL.

Workarounds:
Enforce an ACL on the TFTP used in conjunction with the router, or disable 
SMNP if possible.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:mati@see-security.com.> muts.
The original article can be found at:  
<http://new.remote-exploit.org/index.php/SNMP_Spoof>; 
http://new.remote-exploit.org/index.php/SNMP_Spoof




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру