Cisco Security Vulnerability Thread.
-
Wi-Fi access points sold by Cisco, Meraki, and Aruba have two critical vulnerabilities being patched that could allow hackers to run malware inside the sensitive networks that use the gear. While the flaws open corporate networks to some scary attacks, the real-world likelihood of them being exploited is debatable.
-
3 new vulnerabilities this morning.
Remote code execution
Cisco Stealthwatch Management Console Authentication Bypass Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-smc-auth-bypass2nd remote code execution.
Cisco Unity Express Arbitrary Command Execution Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-cueAnd a Meraki local privilege escalation for good measure.
Cisco Meraki Local Status Page Privilege Escalation Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-meraki -
@travisdh1 wow, that's out of control.
-
They made it more than a month! It must be a record.
Web based privilege escalation on ASA boxes.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181219-asa-privesc -
Two Cisco ESA (Email Security Gateway) DDOS vulnerabilities today:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos -
@travisdh1 Is your hatred towards Ubuntu the same with Cisco? The fact that you created a thread just for it makes me think so.
-
@black3dynamite said in Cisco Security Vulnerability Thread.:
@travisdh1 Is your hatred towards Ubuntu the same with Cisco? The fact that you created a thread just for it makes me think so.
I created this thread because of all the people that were claiming that Cisco does not have security issues, when we know that assertion is not true. It's really more about documenting what we already know than an active "I don't like Cisco".
That said, it is true, I don't like Cisco. If they made products that were priced right and not an active security breach waiting to happen.
-
@black3dynamite said in Cisco Security Vulnerability Thread.:
@travisdh1 Is your hatred towards Ubuntu the same with Cisco? The fact that you created a thread just for it makes me think so.
Lol, I wouldn't classify it as much but a lot of people do hate Ubuntu/Debian... unwarranted in my opinion but hey what can I say, I am biased
-
@dbeato said in Cisco Security Vulnerability Thread.:
@black3dynamite said in Cisco Security Vulnerability Thread.:
@travisdh1 Is your hatred towards Ubuntu the same with Cisco? The fact that you created a thread just for it makes me think so.
Lol, I wouldn't classify it as much but a lot of people do hate Ubuntu/Debian... unwarranted in my opinion but hey what can I say, I am biased
I hate Ubuntu, but Debian is fine.
-
@JaredBusch said in Cisco Security Vulnerability Thread.:
@dbeato said in Cisco Security Vulnerability Thread.:
@black3dynamite said in Cisco Security Vulnerability Thread.:
@travisdh1 Is your hatred towards Ubuntu the same with Cisco? The fact that you created a thread just for it makes me think so.
Lol, I wouldn't classify it as much but a lot of people do hate Ubuntu/Debian... unwarranted in my opinion but hey what can I say, I am biased
I hate Ubuntu, but Debian is fine.
Point taken.
-
@travisdh1 said in Cisco Security Vulnerability Thread.:
Two Cisco ESA (Email Security Gateway) DDOS vulnerabilities today:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dosAt least these weren't hard coded passwords!
-
@dafyre said in Cisco Security Vulnerability Thread.:
@travisdh1 said in Cisco Security Vulnerability Thread.:
Two Cisco ESA (Email Security Gateway) DDOS vulnerabilities today:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-dos
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dosAt least these weren't hard coded passwords!
That we know of!
-
Only 23 vulnerabilities announced yesterday. I don't have the time to weed through them all!
-
@travisdh1 said in Cisco Security Vulnerability Thread.:
Only 23 vulnerabilities announced yesterday. I don't have the time to weed through them all!
Turns out, one is significantly worse than the unpublicized admin credentials. Their SBS line has the default admin and password account active until you create another admin account. Published admin credentials. FFS Cisco.
-
Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos
-
@travisdh1 said in Cisco Security Vulnerability Thread.:
Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos
This one seems like an actual bug, and not a hard coded password.
From what I read, the TL;DR version is that when you change your web interface password, it doesn't change your CLI password.
-
@dafyre said in Cisco Security Vulnerability Thread.:
@travisdh1 said in Cisco Security Vulnerability Thread.:
Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos
This one seems like an actual bug, and not a hard coded password.
From what I read, the TL;DR version is that when you change your web interface password, it doesn't change your CLI password.
I didn't get a chance to do more than glance at this one. That's actually worse. How do you screw up a credential system that bad?
-
@travisdh1 said in Cisco Security Vulnerability Thread.:
@dafyre said in Cisco Security Vulnerability Thread.:
@travisdh1 said in Cisco Security Vulnerability Thread.:
Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos
This one seems like an actual bug, and not a hard coded password.
From what I read, the TL;DR version is that when you change your web interface password, it doesn't change your CLI password.
I didn't get a chance to do more than glance at this one. That's actually worse. How do you screw up a credential system that bad?
Agreed. My thinking when I originally replied was, "Well, at least this isn't a hard coded backdoor password" lol.
But I think you're right, it is worse in some ways.
-
@dafyre said in Cisco Security Vulnerability Thread.:
@travisdh1 said in Cisco Security Vulnerability Thread.:
@dafyre said in Cisco Security Vulnerability Thread.:
@travisdh1 said in Cisco Security Vulnerability Thread.:
Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos
This one seems like an actual bug, and not a hard coded password.
From what I read, the TL;DR version is that when you change your web interface password, it doesn't change your CLI password.
I didn't get a chance to do more than glance at this one. That's actually worse. How do you screw up a credential system that bad?
Agreed. My thinking when I originally replied was, "Well, at least this isn't a hard coded backdoor password" lol.
But I think you're right, it is worse in some ways.
I don't follow - this is a bug - we're human, we make mistakes.
A hard coded password is not a mistake, it's a decision.
Unless I'm missing something, a hard coded password is much worse.
-
@travisdh1 said in Cisco Security Vulnerability Thread.:
@dafyre said in Cisco Security Vulnerability Thread.:
@travisdh1 said in Cisco Security Vulnerability Thread.:
Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos
This one seems like an actual bug, and not a hard coded password.
From what I read, the TL;DR version is that when you change your web interface password, it doesn't change your CLI password.
I didn't get a chance to do more than glance at this one. That's actually worse. How do you screw up a credential system that bad?
This is actually a very common design. Nearly all systems are this way. One password is to the system, one is to the application on the system. Totally normal.