The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Cisco API Privileges Escalation


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 18 Aug 2005 15:02:45 +0200
Subject: [NEWS] Cisco API Privileges Escalation
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20050818121316.D4C2A57F3@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Cisco API Privileges Escalation
------------------------------------------------------------------------


SUMMARY

"Cisco Clean Access (CCA) is a software solution that can automatically 
detect, isolate, and clean infected or vulnerable devices that attempt to 
access your network."

Lack of authentication while invoking API methods can allow an attacker to 
bypass security posture checking, change the assigned role for a user, 
disconnect users and can also lead to information disclosure on configured 
users.

DETAILS

Vulnerable Systems:
 * CCA releases 3.3.0 to 3.3.9
 * CCA releases 3.4.0 to 3.4.5
 * CCA releases 3.5.0 to 3.5.3

Immune Systems:
 * Any CCA release prior to 3.3.0
 * CCA release 3.5.4 or later

As part of the solution, the CCA Manager offers a documented way to access 
the CCA Manager API using the Hypertext Transfer Protocol (HTTP) over TLS 
(HTTPS) protocol. The API provides methods to allow customer-written 
scripts to do the following:
 * Modify the list of clean machines
 * Change user roles
 * Get user information
 * Query a given user login time
 * Modify timeout values for established user sessions
 * Perform some additional functions

A complete list of methods that can be invoked in this way can be found in 
the CCA Manager Installation and Administration Guide, page 13-21, 
available at  
<http://www.cisco.com/en/US/products/ps6128/products_user_guide_list.html>; 
http://www.cisco.com/en/US/products/ps6128/products_user_guide_list.html

An attacker with access to the network where the CCA Manager is located 
can use a custom script to invoke the API without being required to 
provide authentication credentials.

Successful exploitation of the vulnerability may result in one or more of 
the following:
 * Machines being added to the CCA clean list, bypassing CCA checks and 
being allowed access to the network regardless of their state.
 * Machines being removed from the CCA clean list, preventing those 
machines from accessing the network.
 * Users being assigned to different roles than those configured by the 
CCA administrator, possibly granting access to parts of the network that 
they should not been. allowed to access.
 * Information disclosure - by using the API to query the CCA Manager an 
attacker could collect user names and properties of users configured in 
the CCA Manager.

Vendor Status:
In order to get the fix, customers should access the CCA software patches 
download page. The fix consists of two files:
 * Patch-CSCsb48572.tar.gz - this file contains the fix for all affected 
software versions. It will determine at runtime the CCA software version 
in use and apply the appropriate fix.
 * Readme-Patch-CSCsb48572.txt - this file contains instructions on how to 
apply the fix to a vulnerable CCA Manager server.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:psirt@cisco.com.> Cisco 
Systems Product Security Incident Response Team.
The original article can be found at:  
<http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml>; 
http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру