Feeds

Multiple flaws in Cisco router software exposed

History repeating - or time for the next update?

  • alert
  • submit to reddit

Gartner critical capabilities for enterprise endpoint backup

Cisco Systems has warned that multiple vulnerability with the operating system used by its 600 series routers leave its vulnerable to a barrage of attacks.

Last night, Cisco issued an alert which admitted that 600 series routers was subject to not one, not two, not three but four potentially serious flaws. It advised users to upgrade the software.

One flaw with Cisco CBOS Software, which runs on 600 series routers, means that passwords are stored in clear text in the memory of a router.

If that doesn't take the fancy of crackers they may be interested to learn that when multiple, large ECHO REPLY packets are routed through an affected Cisco 600 router it will stop passing any further traffic.

If denial of service attacks are not to the taste of the s'kiddie in question perhaps he might care to partake in a spot forgery. Another CBOS bug makes it possible to make a successful prediction of TCP Initial Sequence Numbers.

This makes it possible for crackers to modify or intercept traffic that either originates at or terminates at a 600 series device, but doesn't affect traffic flowing through a router in transit between two other points.

Not good - and there's more.

The last flaw means a Cisco 600 router may stop passing traffic or responding to a console when an ECHO REQUEST packet with the record route option is sent through it. It's just as well exploits that involve breaking router security are generally beyond the expertise of most s'kiddies.

The solution to all these problems is to upgrade from earlier software to either of the following CBOS releases: 2.3.9, 2.4.1 and 2.4.2. More information on the issue is available here.

In writing the story we were struck with an odd sense of deja vu. Indeed last December, Cisco was forced to admit a similar (though different) set of FOUR security flaws that affected 600 series routers.

In December we speculated as to why Cisco had not issued a separate notice for each vulnerability, since each was different. At the time we speculated that Cisco might bunch vulnerability notices together in order to encourage users to upgrade their software. Maybe just one potentially devastating flaw isn't good enough.

We still reckon these batch vulnerability notices are a technique used by Cisco to migrate users to newer versions of its software that tie them even closer to it. Such a move would make great business sense and we'd dearly love to quiz Cisco on this.

Unfortunately Cisco (which has a reputation as having the worst PR of any company in IT among UK journalists) hasn't spoken to us for months and so we're unlikely to be able to ask them anything. If anyone at Borg Central is listening: if we offered cash for interviews would it make any difference? ®

Related Link

Cisco's security notice

Related Stories

Cisco 600 routers offer cracker fun

Secure remote control for conventional and virtual desktops

More from The Register

next story
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Microsoft: Azure isn't ready for biz-critical apps … yet
Microsoft will move its own IT to the cloud to avoid $200m server bill
Oracle reveals 32-core, 10 BEEELLION-transistor SPARC M7
New chip scales to 1024 cores, 8192 threads 64 TB RAM, at speeds over 3.6GHz
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
Object storage bods Exablox: RAID is dead, baby. RAID is dead
Bring your own disks to its object appliances
Nimble's latest mutants GORGE themselves on unlucky forerunners
Crossing Sandy Bridges without stopping for breath
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.