Feeds

Cisco details Black Hat vuln fix

Side issue

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

Cisco last week urged users of its networking kit to upgrade their software following the discovery of a vulnerability that might be exploited to launch denial of service attacks. The networking giant warned that malicious insiders could crash vulnerable systems running its Internetwork Operating System (IOS) software using maliciously crafted IPv6 packets.

Malign packets would need to be sent from the same local network segment as targeted devices, which need to be configured to process IPv6 traffic, increasing the difficulty of mounting a successful attack. But if these barriers are overcome compromised devices may be open to further exploitation, Cisco warns in an advisory. Security notification service Secunia rates the alert as "moderately critical"

Every Cisco device running any unfixed version of Cisco IOS code and configured to process IPv6 packets is potentially at risk. However the networking giant has released free software upgrades (details here) designed to shore up security defences.

Black Hat kerfuffle

Cisco published the advisory on Friday (29 July) two days after the vulnerability was disclosed at the Black Hat security conference in Vegas on Wednesday (27 July). The Black Hat presentation - during which security researcher Michael Lynn demonstrate mechanisms to remotely compromise Cisco routers and run malign code - was swiftly followed by a controversial gagging order from Cisco and Lynn's former employer ISS that saw materials from the talk ripped from conference proceedings. Lynn has agreed to turn over all materials from the talk and to avoid using any Cisco code in his possession for further reverse engineering or security research.

The advisory Cisco issued Friday concerns a local exploit not the possibility of running remote attacks that formed the cornerstone of Lynn's presentation. Nonetheless the advisory presents further fallout from Lynn's talk, and Cisco's response to it, that have together reignited the debate about the disclosure of security vulnerabilities. ®

Related stories

Cisco, ISS file suit against rogue researcher
Settlement reached in Cisco flaw dispute
Unholy trio pose DDoS risk for Cisco kit
VoIP security group goes on the defensive
Cisco takes IPv6 closer to the mainstream

Mobile application security vulnerability report

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.