CertCities.com -- The Ultimate Site for Certified IT Professionals
Register today for a Free Sponsored Tech Library Webcast and you could WIN! Share share | bookmark | e-mail
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: IE8: Behind the 8 Ball

Tech-Ed: Let's (Third) Party!

A Secure Leap into the Cloud

Windows Mobile's New Moves

SQL Speed Secrets


CertCities.com
Let us know what you
think! E-mail us at:



 
 
...Home ... Editorial ... News ..News Story Tuesday: December 28, 2010


Cisco Discloses Serious IOS Flaw


5/27/2008 -- Cisco Systems Inc. last week alerted users to multiple vulnerabilities in the Secure Shell (SSH) server implementation that ships with version 12.4 of its Internetwork Operating System (IOS).

In some cases, Cisco warned, a malicious attacker could exploit a flaw in the IOS SSH implementation to trigger denial of service (DoS) and reload the device.

Elsewhere, Cisco confirmed, attackers can exploit its IOS SSH implementation to generate spurious memory access errors. If an attacker is able to repeatedly reboot an IOS device, extended DoS could result, Cisco warned.

Cisco lists the IOS SSH daemon (SSHd) as an "optional" service, but its use is nonetheless highly recommended, because SSH facilitates secure command-line connectivity to IOS devices. Not all IOS devices are affected. According to Cisco, certain devices powered by IOS version 12.4 (and running SSH) may be affected. Versions of IOS prior to IOS 12.4 (including all 10.x and 11.x releases), as well as Cisco IOS XR are not affected, according to Cisco.

Cisco has published a software update and recommends any of workarounds for customers that don't wish to update their software. The first and most obvious workaround, according to Cisco representatives, is to disable the IOS SSHd. Users can also configure VTY access classes to allow only trusted hosts to establish SSH connections. Elsewhere, Cisco says, users can configure infrastructure Access Control Lists (iACL), a recommended security best practice, to restrict network traffic from targeting infrastructure devices.

In addition, Cisco acknowledges, customers can tap TELNET as an insecure alternative to SSH.

According to Cisco, the SSHd flaws were discovered internally or as a result of customer service requests. As a result, Cisco says it does not know of any malicious activity associated with the SSHd flaws. --Stephen Swoyer



There are 4 CertCities.com user Comments for “Cisco Discloses Serious IOS Flaw”
Page 1 of 1
5/27/08: Anonymous says: This clearly shows Cisco's commitment to secure it's product, and informs their customers. This clealry shows Cisco's commitment to it's customers security.
5/27/08: SarcasticOne says: ... or sloppiness. This isn't the fifth or seventh time some ssh library function rendered IOS hackable or breakable in some way. Perhaps they should draw on the immense experience of the open source crowd, but oh wait, no, we're paying an arm & a leg for this stuff. Nope, gotta make our own...
5/28/08: Anonymous says: Don't give them a pass. remember they ban people from speaking at events, because they have identified volnerabilities. Remember Michael Lynn in 2005. Shows you how commited they are to shutting people up. They just couldn't cover this on up.
6/14/08: Anonymous says: Well just like any other company, Cisco tries to balance what it deems as appropriate enough information to it's customers. Besides TAC is always there to help out as long as you have a valid contract. I never had the same kind of support from any other vendor.
Your comment about: “Cisco Discloses Serious IOS Flaw”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

-- advertisement (story continued below) --

top