__________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN Cisco VPN 3000 Concentrator FTP Management Vulnerabilities [Cisco Security Advisory Document ID: 71141] August 24, 2006 17:00 GMT Number Q-298 ______________________________________________________________________________ PROBLEM: Two vulnerabilities affect the Cisco VPN 3000 series concentrators when FTP is enabled as a file management protocol. PLATFORM: Affected Products Vulnerable Products Cisco VPN 3000 series concentrators 3005, 3015, 3020, 3030, 3060, and the 3080 are affected by these vulnerabilities if they are running a vulnerable software version and if the concentrator is configured to use FTP as a management protocol. FTP as a management protocol is enabled by default. Vulnerable software versions are: * Any version prior to 4.1 * Any 4.1.x version prior to, and including, 4.1(7)L * Any 4.7.x version prior to, and including, 4.7(2)F DAMAGE: By exploiting these vulnerabilities, an attacker could execute the following FTP commands: * CWD - Change working directory * MKD - Create (make) a directory * CDUP - Change directory to the directory one level up * RNFR - Rename file * SIZE - Get file size * RMD - Remove directory SOLUTION: Upgrade to the appropriate version. ______________________________________________________________________________ VULNERABILITY The risk is LOW. By exploiting these vulnerabilities, an ASSESSMENT: attacker could execute the following FTP commands: CWD - Change working directory MKD - Create (make) a directory CDUP - Change directory to the directory one level up RNFR - Rename file SIZE - Get file size RMD - Remove directory ______________________________________________________________________________ LINKS: CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/q-298.shtml ORIGINAL BULLETIN: Cisco Security Advisory Document ID: 71141 http://www.cisco.com/en/US/products/products_security_ advisory09186a0080718330.shtml ______________________________________________________________________________ [***** Start Document ID: 71141 *****] Cisco Security Advisory: Cisco VPN 3000 Concentrator FTP Management Vulnerabilities Document ID: 71141 Advisory ID: cisco-sa-20060823-vpn3k http://www.cisco.com/warp/public/707/cisco-sa-20060823-vpn3k.shtml Revision 1.0 For Public Release 2006 August 23 1600 UTC (GMT) -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- Contents Summary Affected Products Details Impact Software Versions and Fixes Workarounds Obtaining Fixed Software Exploitation and Public Announcements Status of This Notice: FINAL Distribution Revision History Cisco Security Procedures -------------------------------------------------------------------------------- Summary The Cisco VPN 3000 series concentrators are affected by two vulnerabilities when file management via File Transfer Protocol (FTP) is enabled that could allow authenticated or unauthenticated attackers to execute certain FTP commands and delete files on the concentrator. None of the vulnerabilities allows unauthorized users to transfer files from or to the concentrator. Cisco has made free software available to address these vulnerabilities for affected customers. There are workarounds available to mitigate these vulnerabilities as well. This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20060823- vpn3k.shtml. Affected Products Vulnerable Products Cisco VPN 3000 series concentrators 3005, 3015, 3020, 3030, 3060, and the 3080 are affected by these vulnerabilities if they are running a vulnerable software version and if the concentrator is configured to use FTP as a management protocol. FTP as a management protocol is enabled by default. Vulnerable software versions are: Any version prior to 4.1 Any 4.1.x version prior to, and including, 4.1(7)L Any 4.7.x version prior to, and including, 4.7(2)F There are two ways to determine whether the FTP protocol is enabled as a file management protocol: using the web Graphical User Interface (GUI), or using a Command-Line Interface (CLI) via a console, telnet, or Secure Shell (SSH) connection. To use the GUI to determine whether the FTP protocol is enabled as a file management protocol, connect to the web administration interface of the concentrator via the URL: https:///admin/ Then log in to the concentrator using the device administrator credentials and go to the screen "Configuration | System | Management Protocols | FTP". This screen will indicate whether the FTP server on the concentrator is enabled. To accomplish the same thing using the CLI, log in to the concentrator using the chosen access method (console, Telnet or SSH) and go to the same screen ("Configuration -> System Management -> Management Protocols -> Configure FTP"). The prompt will indicate with a number whether the FTP server is enabled. Products Confirmed Not Vulnerable The Cisco VPN 3002 Hardware Client is not affected by these vulnerabilities. Please note that Cisco VPN 3000 Series concentrators are not affected by these vulnerabilities if FTP is not configured as a management protocol. No other Cisco products are currently known to be affected by these vulnerabilities. Details The Cisco VPN 3000 series concentrators are a family of purpose-built, remote access Virtual Private Network (VPN) platforms for data encryption and authentication. The File Transfer Protocol is an application-layer protocol that allows transfer of files between TCP/IP hosts. It uses Transmission Control Protocol (TCP) as the transport protocol and supports user authentication. The Cisco VPN 3000 series concentrators can be configured to use the FTP protocol to manage files stored on the concentrator, like configuration files and certificates. Files can be uploaded to, or downloaded from, the concentrator for backup and configuration purposes. Two vulnerabilities affect the Cisco VPN 3000 series concentrators when FTP is enabled as a file management protocol. By exploiting these vulnerabilities, an attacker could execute the following FTP commands: CWD - Change working directory MKD - Create (make) a directory CDUP - Change directory to the directory one level up RNFR - Rename file SIZE - Get file size RMD - Remove directory These vulnerabilities are documented in Cisco Bug IDs CSCse10733 ( registered customers only) and CSCse10753 ( registered customers only) . None of these vulnerabilities allows unauthorized users to download or upload files from/to the concentrator. Impact Successful exploitation of these vulnerabilities may allow an attacker to: Perform network reconnaissance via the CWD, CDUP, and SIZE FTP commands. Change the configuration of the concentrator by renaming or deleting configuration and certificate files via the RNFR and RMD FTP commands. Please note that since none of these vulnerabilities allows an attacker to upload or download files to/from the concentrator, it is not possible to obtain the configuration of a device or to upload a modified configuration by exploiting the vulnerabilities. Software Versions and Fixes When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution. In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center ("TAC") or your contracted maintenance provider for assistance. Both vulnerabilities are fixed in versions 4.1(7)M and 4.7(2)G of the VPN 3000 Series Concentrators software. Fixed versions of the Cisco VPN 3000 Series concentrators software can be downloaded from the following location: http://www.cisco.com/pcgi-bin/tablebuild.pl/vpn3000-3des?psrtdcat20e2 ( registered customers only) Workarounds Disabling FTP If FTP is not needed to manage the VPN 3000 concentrator, network security best practices recommend that it be disabled. This will completely eliminate the vulnerability. Secure alternatives to FTP include Secure Hyper-Text Transfer Protocol (HTTPS) and Secure Copy (SCP) via Secure Shell (SSH). The use of FTP as a management protocol can be disabled by connecting to the web administration interface of the concentrator via the URL: https:///admin/ and then logging in to the concentrator using the device administrator credentials, going to the screen "Configuration | System | Management Protocols | FTP", and unchecking the "Enable" checkbox. Limiting FTP Access It is possible to limit the exposure of the concentrator by permitting remote FTP management connections only from known, trusted IP addresses. This is also considered a network security best practice. Limiting FTP access to specific IP addresses can be accomplished on the VPN 3000 Series concentrators by defining rules and filters. The traffic filters can be mapped to the interfaces, LAN-to-LAN tunnels, and VPN groups. Traffic rules and filters are configured via the GUI in the screen "Configuration | Policy Management | Traffic Management". To allow FTP access only from specific IP addresses, at least two traffic rules must be defined. The first rule would permit FTP traffic from a specific, trusted IP address or IP subnet. The second rule would deny all other FTP traffic directed at the private interface. The parameters of the first rule could be: Rule Name: permit_ftp_in Direction: Inbound Action: Forward Protocol: TCP Source Address/Wildcard-mask: Destination Address/Wildcard-mask: /0.0.0.0 TCP/UDP Source Port: Range, from 0 to 65535 TCP/UDP Destination Port: FTP (21) This rule will permit inbound TCP port 21 (FTP) traffic but only when the traffic originates from a specific IP address range. The parameters of the second rule could be: Rule Name: deny_ftp_in Direction: Inbound Action: Drop and Log Protocol: TCP Source Address/Wildcard-mask: 0.0.0.0/255.255.255.255 Destination Address/Wildcard-mask: /0.0.0.0 TCP/UDP Source Port: Range, from 0 to 65535 TCP/UDP Destination Port: FTP (21) This rule will drop and log all inbound TCP port 21 (FTP) traffic that is directed at the IP address of the private interface. Note: When new rules are added to a filter, the new rules get added at the bottom of the list of existing rules in the filter. The concentrator processes rules in a filter in sequential order, so if at the bottom of the list there is a rule that permits all traffic (which is the case with the predefined "Private" filter applied by default to the Private interface), then the new rules will not be executed. For this reason it is important that the new rules intended to allow FTP traffic only from trusted addresses be moved to the top of the list of rules. When the traffic rules have been created, they need to be added to a filter by going to the GUI screen "Configuration | Policy Management | Traffic Management | Filters", selecting the desired filter from the list, clicking on the "Assign Rules to Filter" button, and then selecting the new filter rules and clicking on the "<< Add" button. To completely protect the VPN 3000 concentrator from unauthorized FTP traffic, the filter with the new traffic rules needs to be applied to the following: Interfaces: a filter is applied to an interface by going to the GUI screen "Configuration | Interfaces", clicking on an interface name, and then selecting a filter in the "General" tab. By default the predefined filter "Private" is applied to the Private interface and the predefined filter "Public" is applied to the "Public" interface. The "Private" filter is very permissive and it is recommended that the above rules to limit FTP management traffic be added to this filter. The "Public" filter does not permit FTP traffic by default, and if changes have been made to permit FTP traffic, it is recommended that rules are added to only permit FTP traffic to the concentrator from specific IP addresses, as described above. LAN-to-LAN tunnels: a filter is applied to a LAN-to-LAN tunnel by going to the GUI screen "Configuration | Tunneling and Security | IPSec | LAN-to-LAN", selecting the LAN-to-LAN connection and clicking the "Modify" button, and then selecting the specific filter in the "Modify an IPSec LAN-to-LAN connection" screen. By default a LAN-to-LAN connection does not have any filter applied to it. Remove Access VPN tunnels: a filter is applied to a remote access VPN group by going to the GUI screen "Configuration | User Management | Groups", selecting the VPN group and clicking the "Modify Group" button, and then selecting the specific filter in the "General" tab of the "Modify Group" screen. By default a VPN group does not have any filter applied to it. By adding these two traffic rules to the filter applied to the an interface, LAN-to-LAN tunnel, and VPN group, the FTP traffic directed at the concentrator will only be allowed from the specific, trusted IP addresses, regardless of where the IP addresses are located, i.e. internal network or across a VPN tunnel. FTP traffic directed at the concentrator from anywhere else will be dropped and logged. All other FTP traffic is not affected by these rules. If you do not wish to define multiple filters for each interface and the VPN tunnels, you can add the two traffic rules described above to the default "Private" filter and then apply this filter to the Private interface as well as to any LAN-to-LAN connections and Remote Access VPN groups. Please note that using the "Access Control List" feature ("Administration | Access Rights | Access Control List") to control FTP access will not protect against these vulnerabilities because the check for valid IP addresses takes place at authentication time, and the actual vulnerability described in this document takes place before authentication. In addition to the access control mechanism that can be implemented on the VPN 3000 concentrator itself, FTP access to the VPN 3000 concentrator could be blocked as part of an Infrastructure Access Control List (ACL) on screening routers, switches and firewalls controlling all access to the trusted network. Infrastructure ACLs are considered a network security best practice and should be considered as a long-term addition to good network security, as well as a workaround for this specific vulnerability. The white paper entitled "Protecting Your Core: Infrastructure Protection Access Control Lists" presents guidelines and recommended deployment techniques: http://www.cisco.com/en/US/tech/tk648/tk361/technologies_white_paper09186a00801a1a55.shtml Backing Up Configuration and Certificates Always keep backup copies, outside of the concentrator's file system, of the concentrator's configuration and certificates. Management of configuration files can be done from the GUI screen "Administration | File Management". Please refer to the "File Management" section of the VPN 3000 Series Concentrator Reference, Volume II, for additional information: http://www.cisco.com/en/US/products/hw/vpndevc/ps2284/products_administration_guide_ chapter09186a00803ef263.html Management of certificates can be done from the GUI screen "Administration | Certificate Management". Please refer to the "Certificate Management" section of the VPN 3000 Series Concentrator Reference, Volume II, for additional information: http://www.cisco.com/en/US/products/hw/vpndevc/ps2284/products_administration_guide_ chapter09186a00803ef352.html Obtaining Fixed Software Cisco has made free software available to address this vulnerability for affected customers. Prior to deploying software, customers should consult their maintenance provider or check the software for feature set compatibility and known issues specific to their environment. Customers may only install and expect support for the feature sets they have purchased. By installing, downloading, accessing or otherwise using such software upgrades, customers agree to be bound by the terms of Cisco's software license terms found at http://www.cisco.com/public/sw-license-agreement.html, or as otherwise set forth at Cisco.com Downloads at http://www.cisco.com/public/sw-center/sw-usingswc.shtml. Do not contact either "psirt@cisco.com" or "security-alert@cisco.com" for software upgrades. Customers with Service Contracts Customers with contracts should obtain upgraded software through their regular update channels. For most customers, this means that upgrades should be obtained through the Software Center on Cisco's worldwide website at http://www.cisco.com. Customers using Third-party Support Organizations Customers whose Cisco products are provided or maintained through prior or existing agreement with third-party support organizations such as Cisco Partners, authorized resellers, or service providers should contact that support organization for guidance and assistance with the appropriate course of action in regards to this advisory. The effectiveness of any workaround or fix is dependent on specific customer situations such as product mix, network topology, traffic behavior, and organizational mission. Due to the variety of affected products and releases, customers should consult with their service provider or support organization to ensure any applied workaround or fix is the most appropriate for use in the intended network before it is deployed. Customers without Service Contracts Customers who purchase direct from Cisco but who do not hold a Cisco service contract and customers who purchase through third-party vendors but are unsuccessful at obtaining fixed software through their point of sale should get their upgrades by contacting the Cisco Technical Assistance Center (TAC). TAC contacts are as follows. +1 800 553 2447 (toll free from within North America) +1 408 526 7209 (toll call from anywhere in the world) e-mail: tac@cisco.com Have your product serial number available and give the URL of this notice as evidence of your entitlement to a free upgrade. Free upgrades for non-contract customers must be requested through the TAC. Refer to http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for additional TAC contact information, including special localized telephone numbers and instructions and e-mail addresses for use in various languages. Exploitation and Public Announcements The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability described in this advisory. This vulnerability was reported to Cisco by the NCC Group (http://www.nccgroup.com). Cisco would like to thank the NCC Group for reporting this vulnerability and working with us towards resolution of this problem. Status of This Notice: FINAL THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors. Distribution This advisory is posted on Cisco's worldwide website at http://www.cisco.com/warp/public/707/cisco-sa-20060823-vpn3k.shtml. In addition to worldwide web posting, a text version of this notice is clear-signed with the Cisco PSIRT PGP key and is posted to the following e-mail and Usenet news recipients. cust-security-announce@cisco.com first-teams@first.org bugtraq@securityfocus.com vulnwatch@vulnwatch.org cisco@spot.colorado.edu cisco-nsp@puck.nether.net full-disclosure@lists.grok.org.uk comp.dcom.sys.cisco@newsgate.cisco.com Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates. Revision History Revision 1.0 2006-August-23 Initial public release. [***** End Document ID: 71141 *****] _______________________________________________________________________________ CIAC wishes to acknowledge the contributions of Cisco for the information contained in this bulletin. _______________________________________________________________________________ CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CIAC services are available to DOE, DOE contractors, and the NIH. CIAC can be contacted at: Voice: +1 925-422-8193 (7x24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@ciac.org Previous CIAC notices, anti-virus software, and other information are available from the CIAC Computer Security Archive. World Wide Web: http://www.ciac.org/ Anonymous FTP: ftp.ciac.org PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained via WWW at http://www.first.org/. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC) Q-288: ClamAV Buffer Overflow Q-289: Vulnerability May Allow Users With the "File System Management" RBAC Profile to Gain Elevated Privileges Q-290: Xsan Filesystem 1.4 Q-291: Buffer Overflow in the format(1M) Command Q-292: XFree86 Security Update Q-293: Kernel Security Update Q-294: Multiple Security Vulnerabilities in Mozilla 1.4 and 1.7 Q-295: ImageMagick Security Update Q-296: HP OpenView Storage Data Protector Q-297: Cisco Unintentional Password Modification Vulnerability in Cisco Firewall Products