The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[NEWS] Cisco MARS Default Administrative Password


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 15 Jan 2006 19:17:14 +0200
Subject: [NEWS] Cisco MARS Default Administrative Password
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060116085359.C5A2257C3@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Cisco MARS Default Administrative Password
------------------------------------------------------------------------


SUMMARY

Cisco Security Monitoring, Analysis and Response System (CS-MARS) is "a 
security system that receives event logs from various network devices, 
correlates and analyzes the received data for security problems and 
reports the findings. In addition, CS-MARS can perform automated tasks to 
mitigate security problems. All CS-MARS appliances ship with a default 
password set for the undocumented administrative account root".

Successful exploitation of the vulnerability in CS-MARS will result in an 
attacker gaining full administrative privileges on the CS-MARS device.

DETAILS

Vulnerable Systems:
 * CS-MARS version 4.1.2 and prior

Immune Systems:
 * CS-MARS version 4.1.3

The Cisco Security Monitoring, Analysis and Response System (CS-MARS) 
software contains a default password for an undocumented administrative 
account. This password is set, without any user intervention, during 
installation of the software used by CS-MARS appliances, and is the same 
in all installations of the product. Users must be authenticated to the 
CS-MARS command line in order to utilize the default password to access 
the administrative account.

This privileged account is intended to be used only by authorized Cisco 
development engineers for advanced debugging purposes. No direct remote 
access to the root account is permitted. In order to access a privileged 
system shell, users must first successfully login into the CS-MARS system 
administration command line interface with the "pnadmin" account. Once 
authenticated, the root account can be accessed with the undocumented 
command "expert".

Prior to CS-MARS version 4.1.3, users do not have a method to modify the 
root password. CS-MARS versions 4.1.3 and later provide the command 
"passwd expert", which allow users to modify a portion of the root 
password providing additional security. The selected user password is 
combined with a Cisco controlled component to form a new root password.

After performing this step, neither Cisco personnel or the user can access 
the root account without knowledge of both components used to create the 
root password. When authorized Cisco development engineers need access to 
the root account for advanced debugging, both Cisco and the user will need 
to enter their portion of the configured root password to enable access.

Workaround:
To verify the version of CS-MARS software, use a SSH client to login into 
the system administration command line interface with pnadmin account and 
execute the version command.
  prompt$ ssh [email protected]
  [email protected]'s password:
  Last login: Fri Dec 30 15:19:14 2005 from 192.168.1.2

  CS MARS - Mitigation and Response System

    ? for list of commands

  [pnadmin]$ version
  4.1.2 (2042)

The vulnerability described in this advisory can be mitigated by first 
upgrading the software on CS-MARS appliances to version 4.1.3 and then 
using the "passwd expert" command to modify the root password.

CS-MARS appliances can be upgraded via the HTTPS management interface or 
system administration command line. Please refer to the CS-MARS product 
documentation for instructions on how to upgrade the software.

While the documentation refers to CS-MARS 4.x versions, the instructions 
are also applicable to CS-MARS 3.x versions.

 
<http://www.cisco.com/en/US/products/ps6241/products_installation_guide_chapter09186a00804c4db4.html#wp1133308> http://www.cisco.com/en/US/products/ps6241/products_installation_guide_chapter09186a00804c4db4.html#wp1133308

Once a CS-MARS appliance is upgraded to version 4.1.3, the root password 
can be modified using the "passwd expert" command. Using a SSH client, 
login into the CS-MARS system administration interface with the "pnadmin" 
account and use the "passwd expert" command to select a new password. The 
selected password must be at least six characters long.

    prompt$ ssh [email protected]
    [email protected]'s password: Last
    login: Fri Dec 30 19:45:51 2005 from 192.168.1.2

      CS MARS - Mitigation and Response System

        ? for list of commands

    [pnadmin]$ passwd expert
    New password:
    Retype new password:


ADDITIONAL INFORMATION

The information has been provided by  <mailto:psirt@cisco.com.> Cisco 
Systems.
The original article can be found at:  
<http://www.cisco.com/warp/public/707/cisco-sa-20060111-mars.shtml>; 
http://www.cisco.com/warp/public/707/cisco-sa-20060111-mars.shtml




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру