Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Exit./
- .
- ..
- ...
- #+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#
- #+# [+] Priv8 security Document about The U.S. Department of Energy #+#
- #+# [+] By: ~{ J!h4d-X }~ #+#
- #+# [+] Contact: Jih4d-X@FBI.al #+#
- #+# [+] Greetz: { X-muslim ~ Root Max ~ KiNG H4ck3r ~ Rajaoui PS } #+#
- #+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#+#
- ___________________________________________________________________________________________
- ___________________________________________________________________________________________
- __________________________________________________________
- The U.S. Department of Energy
- Computer Incident Advisory Capability
- ___ __ __ _ ___
- / | /_\ /
- \___ __|__ / \ \___
- __________________________________________________________
- INFORMATION BULLETIN
- Cisco WLSE and HSE Contain Default Passwords
- [Cisco Security Advisory: A Default Username and Password in
- WLSE and HSE Devices, Doc#50400]
- April 7, 2004 22:00 GMT Number O-111
- [REVISED 09 Apr 2004]
- ______________________________________________________________________________
- PROBLEM: A default username/password pair is compiled into all releases
- of the Wireless LAN Solution Engine (WLSE) and Hosting Solution
- Engine (HSE) software. This account cannot be disabled and
- gives an intruder full control of the device.
- PLATFORM: Cisco Wireless LAN Solution Engine (WLSE) 2.0, 2.0.2 and 2.5
- Cisco Hosting Solution Engine (HSE) 1.7, 1.7.1, 1.7.2 and 1.7.3
- DAMAGE: A remote user can take full control of the device and modify
- the configuration, change user info, and add new users.
- SOLUTION: Install the patches indicated in the bulletin.
- ______________________________________________________________________________
- VULNERABILITY The risk is HIGH. A remote user can take full control of the
- ASSESSMENT: system.
- ______________________________________________________________________________
- LINKS:
- CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/o-111.shtml
- ORIGINAL BULLETIN: http://www.cisco.com/warp/public/707/cisco-sa-20040407-
- username.shtml
- PATCHES: Patches (registered users)
- WLSE http://www.cisco.com/pcgi-bin/tablebuild.pl/wlan-
- sol-eng
- HSE http://www.cisco.com/pcgi-bin/tablebuild.pl/1105-
- host-sol
- ______________________________________________________________________________
- REVISION HISTORY:
- 04/09/04 - updated Cisco Security Advisory Doc #50400 to include changes in
- Revision 1.3 including changes to the Software Versions and Fixes.
- [***** Start Cisco Security Advisory: A Default Username and Password in
- WLSE and HSE Devices, Doc#50400 *****]
- Cisco Security Advisory: A Default Username and Password in WLSE and HSE Devices
- Document ID: 50400
- Revision 1.1
- Last Updated
- For Public Release 2004 April 07 1600 UTC (GMT)
- ------------------------------------------------------------------------------
- Please provide your feedback on this document.
- ------------------------------------------------------------------------------
- Contents
- Summary
- Affected Products
- Details
- Impact
- Software Versions and Fixes
- Obtaining Fixed Software
- Workarounds
- Exploitation and Public Announcements
- Status of This Notice: FINAL
- Distribution
- Revision History
- Cisco Security Procedures
- ------------------------------------------------------------------------------
- Summary
- A default username/password pair is present in all releases of the Wireless LAN
- Solution Engine (WLSE) and Hosting Solution Engine (HSE) software. A user who
- logs in using this username has complete control of the device. This username
- cannot be disabled. There is no workaround.
- This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-
- 20040407-username.shtml.
- Affected Products
- The affected software releases for WLSE are 2.0, 2.0.2 and 2.5.
- The affected software releases for HSE are 1.7, 1.7.1, 1.7.2 and 1.7.3.
- Details
- A hardcoded username and password pair is present in all software releases for
- all models of WLSE and HSE devices.
- This vulnerability is documented in the Cisco Bug Toolkit as Bug ID CSCsa11583
- ( registered customers only) for the WLSE and CSCsa11584 (registered customers
- only) for the HSE.
- CiscoWorks WLSE provides centralized management for the Cisco Wireless LAN
- infrastructure. It unifies the other components in the solution and actively
- employs them to provide continual "Air/RF" monitoring, network security, and
- optimization. The CiscoWorks WLSE also assists network managers by automating
- and simplifying mass configuration deployment, fault monitoring and alerting.
- Cisco Hosting Solution Engine is a hardware-based solution to monitor and
- activate a variety of e-business services in Cisco powered data centers. It
- provides fault and performance information about the Layer 2-3 hosting
- infrastructure and Layer 4-7 hosted services.
- Impact
- Any user who logs in using this username has complete control of the device.
- One can add new users or modify details of the existing users, and change the
- device's configuration. Here are some more concrete examples of possible
- actions:
- For WLSE this means that an adversary can hide the presence of a rogue Access
- Point or change the Radio Frequency plan, potentially causing system-wide
- outages. The first action may cause long term loss of information
- confidentiality and integrity. The second action can yield Denial-of-Service
- (DOS).
- For HSE this may lead up to illegal re-directing of a Web site with the
- ultimate loss of revenue.
- In both cases the device itself may be used as a launching platform for
- further attacks. Such attacks could be directed at your organization, or
- towards a third party.
- Software Versions and Fixes
- For WLSE, users need to install the WLSE-2.x-CSCsa11583-K9.zip patch. The
- patch can be downloaded from http://www.cisco.com/pcgi-bin/tablebuild.pl/
- wlan-sol-eng ( registered customers only) . Installation instructions are
- included in the accompanying README file, WLSE-2.x-CSCsa11583-K9.readmeV3.txt,
- in that same download directory. This patch is applicable to WLSE 1130
- software releases 2.0, 2.0.2 and 2.5.
- For HSE, users need to install the HSE-1.7.x-CSCsa11584.zip patch. The
- patch can be downloaded from http://www.cisco.com/pcgi-bin/tablebuild.pl/
- 1105-host-sol ( registered customers only) . Installation instructions
- are included in the accompanying README file, HSE-1.7.x-CSCsa11584.readme.txt,
- in that same download directory. This patch is applicable to HSE 1105 for
- versions 1.7, 1.7.1, 1.7.2, and 1.7.3.
- Obtaining Fixed Software
- Customers with Service Contracts
- Customers with contracts should obtain upgraded software through their regular
- update channels. For most customers, this means that upgrades should be
- obtained through the Software Center on Cisco's worldwide website at
- http://www.cisco.com.
- Customers using Third-party Support Organizations
- Customers whose Cisco products are provided or maintained through prior or
- existing agreement with third-party support organizations such as Cisco
- Partners, authorized resellers, or service providers should contact that
- support organization for assistance with the upgrade, which should be
- free of charge.
- Customers without Service Contracts
- Customers who purchase direct from Cisco but who do not hold a Cisco service
- contract and customers who purchase through third-party vendors but are
- unsuccessful at obtaining fixed software through their point of sale should
- get their upgrades by contacting the Cisco Technical Assistance Center (TAC).
- TAC contacts are as follows.
- +1 800 553 2447 (toll free from within North America)
- +1 408 526 7209 (toll call from anywhere in the world)
- e-mail: tac@cisco.com
- Please have your product serial number available and give the URL of this
- notice as evidence of your entitlement to a free upgrade. Free upgrades for
- non-contract customers must be requested through the TAC.
- Please do not contact either "psirt@cisco.com" or "security-alert@cisco.com"
- for software upgrades.
- If you need assistance with the implementation of the workarounds, or have
- questions on the workarounds, please contact the Cisco Technical Assistance
- Center (TAC).
- +1 800 553 2447 (toll free from within North America)
- +1 408 526 7209 (toll call from anywhere in the world)
- e-mail: tac@cisco.com
- See http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for additional
- TAC contact information, including special localized telephone numbers and
- instructions and e-mail addresses for use in various languages.
- Customers may only install and expect support for the feature sets they have
- purchased. By installing, downloading, accessing or otherwise using such
- software upgrades, customers agree to be bound by the terms of Cisco's
- software license terms found at
- http://www.cisco.com/public/sw-license-agreement.html, or as otherwise set
- forth at Cisco.com
- Downloads at http://www.cisco.com/public/sw-center/sw-usingswc.shtml.
- Workarounds
- There is no workaround.
- Exploitation and Public Announcements
- The Cisco PSIRT is not aware of any public announcements or malicious use of
- the vulnerability described in this advisory.
- Status of This Notice: FINAL
- This is a final advisory. Although Cisco cannot guarantee the accuracy of all
- statements in this advisory, all of the facts have been checked to the best of
- our ability. Cisco does not anticipate issuing updated versions of this
- advisory unless there is some material change in the facts. Should there be a
- significant change in the facts, Cisco will update this advisory.
- A standalone copy or paraphrase of the text of this security advisory that
- omits the distribution URL in the following section is an uncontrolled copy,
- and may lack important information or contain factual errors.
- Distribution
- This advisory will be posted on Cisco's worldwide website at
- http://www.cisco.com/warp/public/707/cisco-sa-20040407-username.shtml.
- In addition to worldwide web posting, a text version of this notice is
- clear-signed with the Cisco PSIRT PGP key and is posted to the following
- e-mail and Usenet news recipients.
- cust-security-announce@cisco.com
- bugtraq@securityfocus.com
- first-teams@first.org (includes CERT/CC)
- cisco@spot.colorado.edu
- comp.dcom.sys.cisco
- firewalls@lists.gnac.com
- Future updates of this advisory, if any, will be placed on Cisco's worldwide
- website, but may or may not be actively announced on mailing lists or
- newsgroups. Users concerned about this problem are encouraged to check the
- above URL for any updates.
- Revision History
- Revision 1.1
- 2004-April-07
- Correction in the Obtaining Fixed Software section.
- Revision 1.0
- 2004-April-07
- Initial public release.
- Cisco Security Procedures
- Complete information on reporting security vulnerabilities in Cisco products,
- obtaining assistance with security incidents, and registering to receive
- security information from Cisco, is available on Cisco's worldwide website
- at http://www.cisco.com/warp/public/707/sec_incident_response.shtml.
- This includes instructions for press inquiries regarding Cisco security
- notices. All Cisco security advisories are available at
- http://www.cisco.com/go/psirt.
- [***** End Cisco Security Advisory: A Default Username and Password in
- WLSE and HSE Devices, Doc#50400 *****]
- _______________________________________________________________________________
- CIAC wishes to acknowledge the contributions of Cisco Systems, Inc. for the
- information contained in this bulletin.
- _______________________________________________________________________________
- CIAC, the Computer Incident Advisory Capability, is the computer
- security incident response team for the U.S. Department of Energy
- (DOE) and the emergency backup response team for the National
- Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
- National Laboratory in Livermore, California. CIAC is also a founding
- member of FIRST, the Forum of Incident Response and Security Teams, a
- global organization established to foster cooperation and coordination
- among computer security teams worldwide.
- CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
- can be contacted at:
- Voice: +1 925-422-8193 (7x24)
- FAX: +1 925-423-8002
- STU-III: +1 925-423-2604
- E-mail: ciac@ciac.org
- Previous CIAC notices, anti-virus software, and other information are
- available from the CIAC Computer Security Archive.
- World Wide Web: http://www.ciac.org/
- Anonymous FTP: ftp.ciac.org
- PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
- communities receive CIAC bulletins. If you are not part of these
- communities, please contact your agency's response team to report
- incidents. Your agency's team will coordinate with CIAC. The Forum of
- Incident Response and Security Teams (FIRST) is a world-wide
- organization. A list of FIRST member organizations and their
- constituencies can be obtained via WWW at http://www.first.org/.
- This document was prepared as an account of work sponsored by an
- agency of the United States Government. Neither the United States
- Government nor the University of California nor any of their
- employees, makes any warranty, express or implied, or assumes any
- legal liability or responsibility for the accuracy, completeness, or
- usefulness of any information, apparatus, product, or process
- disclosed, or represents that its use would not infringe privately
- owned rights. Reference herein to any specific commercial products,
- process, or service by trade name, trademark, manufacturer, or
- otherwise, does not necessarily constitute or imply its endorsement,
- recommendation or favoring by the United States Government or the
- University of California. The views and opinions of authors expressed
- herein do not necessarily state or reflect those of the United States
- Government or the University of California, and shall not be used for
- advertising or product endorsement purposes.
- LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)
- O-101: OpenSSL Denial of Service Vulnerability
- O-102: IBM AIX rexecd Vulnerability
- O-103: Apache HTTP Server mod_access Information Disclosure
- O-104: ICQ Parsing in ISS Products May Lead to Buffer Overflow
- O-105: Multiple Vulnerabilities in Ethereal 0.10.2
- O-106: Mozilla 1.4 Vulnerabilities
- O-107: vfte Buffer Overflow Vulnerabilities
- O-108: Squid ACL Bypass Vulnerability
- O-109: Heimdal Kerberos Cross-Realm Vulnerability
- O-110: MAC OS X Jaguar and Panther Security Vulnerabilities
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement