CertCities.com -- The Ultimate Site for Certified IT Professionals
Listen, See, Win! Register for a Free Tech Library Webcast Share share | bookmark | e-mail
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: IE8: Behind the 8 Ball

Tech-Ed: Let's (Third) Party!

A Secure Leap into the Cloud

Windows Mobile's New Moves

SQL Speed Secrets


CertCities.com
Let us know what you
think! E-mail us at:



 
 
...Home ... Editorial ... News ..News Story Tuesday: December 28, 2010


Cisco Warns of New Wireless Vulnerability


4/16/2007 -- Cisco Systems Inc. last week warned of a vulnerability in its Cisco Wireless LAN Controllers (WLC) that could give unauthenticated remote attackers access to compromised systems. Cisco said the new vulnerability is only moderately serious, however.

The flaw affects WLC versions 4.0.206.0 (and earlier) and 3.2.185.0 (and earlier), which ship configured with insecure default SNMP credentials.

The attack itself is fairly straightforward, according to a Security Advisory which Cisco posted last week: A remote attacker can use SNMP community strings to connect directly to a vulnerable WLC device (typically, via port 161); once connected, the attacker can perpetrate an unidentified exploit in order to gain access to the device. From there, the attacker can view or make changes to the WLC configuration. In some cases, Cisco officials acknowledged, an attacker could gain complete control over a compromised device.

Code to exploit the SNMP vulnerability does exist, Cisco confirmed, but there's no evidence yet of public attacks, targeted or otherwise.

The vulnerability affects not only Cisco's Wireless LAN Controllers (the 4400 and 2100 Series, as well as the WLC Module), but also its wireless integrated Catalyst switches -- including the Wireless Services Module (WiSM) that ships with the Catalyst 6500 Series, along with the WLC that's embedded in Cisco's Catalyst 3750 Series. Also affected are Cisco's WLC Module and its Aironet 1000 and 1500 Series Wireless Access Points.

Cisco hasn't yet developed a software update. Instead, officials urge network admins to change their default SNMP community string values and to restrict network access to affected systems using IP-based ACLs.

Cisco also published a document that offers more information and additional workarounds. --Stephen Swoyer



Current CertCities.com user Comments for “Cisco Warns of New Wireless Vulnerability

There are no comments yet. Post one now.

Your comment about: “Cisco Warns of New Wireless Vulnerability”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

-- advertisement (story continued below) --

top