ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Cisco Security Vulnerability Thread.

    News
    cisco security
    14
    91
    11.5k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • dbeatoD
      dbeato @black3dynamite
      last edited by

      @black3dynamite said in Cisco Security Vulnerability Thread.:

      @travisdh1 Is your hatred towards Ubuntu the same with Cisco? The fact that you created a thread just for it makes me think so.

      Lol, I wouldn't classify it as much but a lot of people do hate Ubuntu/Debian... unwarranted in my opinion but hey what can I say, I am biased 🙂

      JaredBuschJ 1 Reply Last reply Reply Quote 0
      • JaredBuschJ
        JaredBusch @dbeato
        last edited by

        @dbeato said in Cisco Security Vulnerability Thread.:

        @black3dynamite said in Cisco Security Vulnerability Thread.:

        @travisdh1 Is your hatred towards Ubuntu the same with Cisco? The fact that you created a thread just for it makes me think so.

        Lol, I wouldn't classify it as much but a lot of people do hate Ubuntu/Debian... unwarranted in my opinion but hey what can I say, I am biased 🙂

        I hate Ubuntu, but Debian is fine.

        dbeatoD 1 Reply Last reply Reply Quote 1
        • dbeatoD
          dbeato @JaredBusch
          last edited by

          @JaredBusch said in Cisco Security Vulnerability Thread.:

          @dbeato said in Cisco Security Vulnerability Thread.:

          @black3dynamite said in Cisco Security Vulnerability Thread.:

          @travisdh1 Is your hatred towards Ubuntu the same with Cisco? The fact that you created a thread just for it makes me think so.

          Lol, I wouldn't classify it as much but a lot of people do hate Ubuntu/Debian... unwarranted in my opinion but hey what can I say, I am biased 🙂

          I hate Ubuntu, but Debian is fine.

          Point taken.

          1 Reply Last reply Reply Quote 0
          • dafyreD
            dafyre @travisdh1
            last edited by

            @travisdh1 said in Cisco Security Vulnerability Thread.:

            Two Cisco ESA (Email Security Gateway) DDOS vulnerabilities today:
            https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-dos
            https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos

            At least these weren't hard coded passwords!

            travisdh1T 1 Reply Last reply Reply Quote 1
            • travisdh1T
              travisdh1 @dafyre
              last edited by

              @dafyre said in Cisco Security Vulnerability Thread.:

              @travisdh1 said in Cisco Security Vulnerability Thread.:

              Two Cisco ESA (Email Security Gateway) DDOS vulnerabilities today:
              https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-dos
              https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-esa-url-dos

              At least these weren't hard coded passwords!

              That we know of!

              1 Reply Last reply Reply Quote 0
              • travisdh1T
                travisdh1
                last edited by

                Only 23 vulnerabilities announced yesterday. I don't have the time to weed through them all!

                https://tools.cisco.com/security/center/publicationListing.x?product=Cisco&sort=-day_sir#~Vulnerabilities

                travisdh1T 1 Reply Last reply Reply Quote 2
                • travisdh1T
                  travisdh1 @travisdh1
                  last edited by

                  @travisdh1 said in Cisco Security Vulnerability Thread.:

                  Only 23 vulnerabilities announced yesterday. I don't have the time to weed through them all!

                  https://tools.cisco.com/security/center/publicationListing.x?product=Cisco&sort=-day_sir#~Vulnerabilities

                  Turns out, one is significantly worse than the unpublicized admin credentials. Their SBS line has the default admin and password account active until you create another admin account. Published admin credentials. FFS Cisco.

                  1 Reply Last reply Reply Quote 1
                  • travisdh1T
                    travisdh1
                    last edited by

                    Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!

                    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos

                    dafyreD 1 Reply Last reply Reply Quote 1
                    • dafyreD
                      dafyre @travisdh1
                      last edited by dafyre

                      @travisdh1 said in Cisco Security Vulnerability Thread.:

                      Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!

                      https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos

                      This one seems like an actual bug, and not a hard coded password.

                      From what I read, the TL;DR version is that when you change your web interface password, it doesn't change your CLI password.

                      travisdh1T 1 Reply Last reply Reply Quote 0
                      • travisdh1T
                        travisdh1 @dafyre
                        last edited by

                        @dafyre said in Cisco Security Vulnerability Thread.:

                        @travisdh1 said in Cisco Security Vulnerability Thread.:

                        Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!

                        https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos

                        This one seems like an actual bug, and not a hard coded password.

                        From what I read, the TL;DR version is that when you change your web interface password, it doesn't change your CLI password.

                        I didn't get a chance to do more than glance at this one. That's actually worse. How do you screw up a credential system that bad?

                        dafyreD scottalanmillerS 2 Replies Last reply Reply Quote 1
                        • dafyreD
                          dafyre @travisdh1
                          last edited by dafyre

                          @travisdh1 said in Cisco Security Vulnerability Thread.:

                          @dafyre said in Cisco Security Vulnerability Thread.:

                          @travisdh1 said in Cisco Security Vulnerability Thread.:

                          Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!

                          https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos

                          This one seems like an actual bug, and not a hard coded password.

                          From what I read, the TL;DR version is that when you change your web interface password, it doesn't change your CLI password.

                          I didn't get a chance to do more than glance at this one. That's actually worse. How do you screw up a credential system that bad?

                          Agreed. My thinking when I originally replied was, "Well, at least this isn't a hard coded backdoor password" lol.

                          But I think you're right, it is worse in some ways.

                          DashrenderD 1 Reply Last reply Reply Quote 0
                          • DashrenderD
                            Dashrender @dafyre
                            last edited by

                            @dafyre said in Cisco Security Vulnerability Thread.:

                            @travisdh1 said in Cisco Security Vulnerability Thread.:

                            @dafyre said in Cisco Security Vulnerability Thread.:

                            @travisdh1 said in Cisco Security Vulnerability Thread.:

                            Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!

                            https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos

                            This one seems like an actual bug, and not a hard coded password.

                            From what I read, the TL;DR version is that when you change your web interface password, it doesn't change your CLI password.

                            I didn't get a chance to do more than glance at this one. That's actually worse. How do you screw up a credential system that bad?

                            Agreed. My thinking when I originally replied was, "Well, at least this isn't a hard coded backdoor password" lol.

                            But I think you're right, it is worse in some ways.

                            I don't follow - this is a bug - we're human, we make mistakes.

                            A hard coded password is not a mistake, it's a decision.

                            Unless I'm missing something, a hard coded password is much worse.

                            1 Reply Last reply Reply Quote 1
                            • scottalanmillerS
                              scottalanmiller @travisdh1
                              last edited by

                              @travisdh1 said in Cisco Security Vulnerability Thread.:

                              @dafyre said in Cisco Security Vulnerability Thread.:

                              @travisdh1 said in Cisco Security Vulnerability Thread.:

                              Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!

                              https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos

                              This one seems like an actual bug, and not a hard coded password.

                              From what I read, the TL;DR version is that when you change your web interface password, it doesn't change your CLI password.

                              I didn't get a chance to do more than glance at this one. That's actually worse. How do you screw up a credential system that bad?

                              This is actually a very common design. Nearly all systems are this way. One password is to the system, one is to the application on the system. Totally normal.

                              travisdh1T 1 Reply Last reply Reply Quote 0
                              • travisdh1T
                                travisdh1 @scottalanmiller
                                last edited by

                                @scottalanmiller said in Cisco Security Vulnerability Thread.:

                                @travisdh1 said in Cisco Security Vulnerability Thread.:

                                @dafyre said in Cisco Security Vulnerability Thread.:

                                @travisdh1 said in Cisco Security Vulnerability Thread.:

                                Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!

                                https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos

                                This one seems like an actual bug, and not a hard coded password.

                                From what I read, the TL;DR version is that when you change your web interface password, it doesn't change your CLI password.

                                I didn't get a chance to do more than glance at this one. That's actually worse. How do you screw up a credential system that bad?

                                This is actually a very common design. Nearly all systems are this way. One password is to the system, one is to the application on the system. Totally normal.

                                You're assuming it was supposed to be designed that way.

                                scottalanmillerS 1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller @travisdh1
                                  last edited by

                                  @travisdh1 said in Cisco Security Vulnerability Thread.:

                                  @scottalanmiller said in Cisco Security Vulnerability Thread.:

                                  @travisdh1 said in Cisco Security Vulnerability Thread.:

                                  @dafyre said in Cisco Security Vulnerability Thread.:

                                  @travisdh1 said in Cisco Security Vulnerability Thread.:

                                  Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!

                                  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos

                                  This one seems like an actual bug, and not a hard coded password.

                                  From what I read, the TL;DR version is that when you change your web interface password, it doesn't change your CLI password.

                                  I didn't get a chance to do more than glance at this one. That's actually worse. How do you screw up a credential system that bad?

                                  This is actually a very common design. Nearly all systems are this way. One password is to the system, one is to the application on the system. Totally normal.

                                  You're assuming it was supposed to be designed that way.

                                  No, I'm stating that it is super normal and expected. It's only that you assume that it is supposed to be designed differently that makes it seem weird. It's good to tie the two together in many cases, but very few vendors do, it should never be assumed.

                                  travisdh1T 1 Reply Last reply Reply Quote 0
                                  • travisdh1T
                                    travisdh1 @scottalanmiller
                                    last edited by

                                    @scottalanmiller said in Cisco Security Vulnerability Thread.:

                                    @travisdh1 said in Cisco Security Vulnerability Thread.:

                                    @scottalanmiller said in Cisco Security Vulnerability Thread.:

                                    @travisdh1 said in Cisco Security Vulnerability Thread.:

                                    @dafyre said in Cisco Security Vulnerability Thread.:

                                    @travisdh1 said in Cisco Security Vulnerability Thread.:

                                    Cisco Network Assurance Engine CLI default user/password. At this point, I'm assuming anything Cisco has an unpublished admin user/password somewhere!

                                    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190212-nae-dos

                                    This one seems like an actual bug, and not a hard coded password.

                                    From what I read, the TL;DR version is that when you change your web interface password, it doesn't change your CLI password.

                                    I didn't get a chance to do more than glance at this one. That's actually worse. How do you screw up a credential system that bad?

                                    This is actually a very common design. Nearly all systems are this way. One password is to the system, one is to the application on the system. Totally normal.

                                    You're assuming it was supposed to be designed that way.

                                    No, I'm stating that it is super normal and expected. It's only that you assume that it is supposed to be designed differently that makes it seem weird. It's good to tie the two together in many cases, but very few vendors do, it should never be assumed.

                                    Then shouldn't you also have different account names as well? Not having a different account name, or documentation clearly spelling the difference out, creates a human based security hole. (Not that people actually read documentation.)

                                    Also, just because it's common, doesn't mean it's right. (Just getting it out there.)

                                    1 Reply Last reply Reply Quote 0
                                    • travisdh1T
                                      travisdh1
                                      last edited by

                                      Only 17 more on the list this morning. Most of them are probably not horrible, but there are some remote vulnerabilities in there. No, I haven't reviewed any of them myself yet.

                                      https://tools.cisco.com/security/center/publicationListing.x

                                      1 Reply Last reply Reply Quote 0
                                      • travisdh1T
                                        travisdh1
                                        last edited by

                                        RV110W, RV130W, and RV215W routers management interface remote vulnerability.

                                        https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-rmi-cmd-ex

                                        1 Reply Last reply Reply Quote 0
                                        • travisdh1T
                                          travisdh1
                                          last edited by

                                          Go patch all your Cisco things. Lots of stuff they classify as High priority and a fix for the router vulnerability from last week.

                                          https://tools.cisco.com/security/center/publicationListing.x?product=Cisco&sort=-day_sir#~Vulnerabilities

                                          1 Reply Last reply Reply Quote 0
                                          • travisdh1T
                                            travisdh1
                                            last edited by

                                            Only 2 things today. They must have had a slow week.

                                            https://www.us-cert.gov/ncas/current-activity/2019/03/13/Cisco-Releases-Security-Updates

                                            According to CISA, one is yet another hardcoded credential, and one is a DDOS vulnerability.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 4 / 5
                                            • First post
                                              Last post