heise Security IT security news and services at heise Security UK
14 March 2008, 18:09

Insecure by design: Cisco product shipped with backdoor

Cisco has reported a critical security hole in CiscoWorks Internetwork Performance Monitor[1] (IPM), the network availability monitoring component of the CiscoWorks LAN Management Solution (LMS). According to the advisory, commands can be executed remotely on the underlying Solaris or Windows operating system without authentication.

Cisco reports that the problem is due to the IPM starting a process that binds a shell to a randomly selected TCP port. The shell executes commands entered there at system privilege level under Windows and at casuser privilege level under Solaris. Version 2.6 is affected. An update is available. Cisco has rated the hole as critical and advises all users to install the update as soon as possible.

Cisco's advisory does not describe how this unusual vulnerability came about. The vendor says that no exploits have been reported so far.

See also:

  • CiscoWorks Internetwork Performance Monitor Remote Command Execution Vulnerability[2], Cisco security advisory

(mba[3])


URL of this article:
http://www.heise-online.co.uk/security/news/110320

Links in this article:
  [1] http://www.cisco.com/en/US/products/sw/cscowork/ps1008/
  [2] http://www.cisco.com/warp/public/707/cisco-sa-20080313-ipm.shtml
  [3] mailto:mba@heise-online.co.uk

arrow
arrow
    全站熱搜
    創作者介紹
    創作者 ivan0914 的頭像
    ivan0914

    I'n Blog 之萬象真藏

    ivan0914 發表在 痞客邦 留言(0) 人氣()