This advisory documents two vulnerabilities for the Cisco PIX firewall. These vulnerabilities are documented as CSCeb20276 (SNMPv3) and CSCec20244 (VPNC). There are workarounds available to mitigate the effects of CSCeb20276 (SNMPv3). No workaround is available for CSCec20244 (VPNC). This advisory will be posted at http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20031215-pix.
This advisory documents two vulnerabilities for the Cisco PIX firewall. These vulnerabilities are documented as CSCeb20276 (SNMPv3) and CSCec20244 (VPNC).
There are workarounds available to mitigate the effects of CSCeb20276 (SNMPv3). No workaround is available for CSCec20244 (VPNC).
This advisory will be posted at http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20031215-pix.
This section provides details on affected products.
All Cisco PIX firewall devices running the affected Cisco PIX firewall software, as documented below, are affected by these vulnerabilities.
The Firewall Service Module (FWSM) is also vulnerable to the SNMPv3 issue and is documented as http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20031215-fwsm. No other Cisco products are currently known to be affected by these vulnerabilities.
To determine your software revision, type show version at the command line prompt.
No other Cisco products are currently known to be affected by these vulnerabilities.
This section provides detailed information about these vulnerabilities.
The Internetworking Terms and Cisco Systems Acronyms online guides can be found at http://www.cisco.com/univercd/cc/td/doc/cisintwk/.
These vulnerabilities are documented in the Cisco Bug Toolkit as Bug ID CSCeb20276 (SNMPv3) and CSCec20244 (VPNC). To access this tool, you must be a registered user and you must be logged in.
This section describes workarounds for these vulnerabilities.
Note:
Both Poll and Trap are enabled if one does not
specifically use the poll or trap keyword in the command above. The above
command cannot prevent a source IP spoofed SNMP request message from exploiting
this vulnerability. Prior to software version 6.0, one cannot selectively
enable poll and trap functionality because there are no Poll
and Trap keywords in the snmp-server host
Note: The Cisco PIX firewall does not allow one to remove the community string altogether. It will always be either public or a user configured string. show snmp will still show snmp-server community public, but this does not mean SNMP is enabled.
More details at http://www.cisco.com/en/US/docs/security/pix/pix62/command/reference/s.html#wp1026423.The Cisco PSIRT recommends that affected users upgrade to a fixed software version of code.
When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Technical Assistance Center ("TAC") or your contracted maintenance provider for assistance.
The procedure to upgrade to the fixed software version is detailed at http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/index.htm.
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities described in this advisory.
CSCeb20276 (SNMPv3) was reported to the PSIRT by Rasto Rickardt.
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Revision 1.2 |
2004-January-26 |
Removed reference to CSCea28896, as it did not affect any released software. Added elaborative text to the SNMPv3 workaround section. |
Revision 1.1 |
2003-December-17 |
Added clear snmp-server command to the disable SNMP server workaround. Added elaborative text to the SNMPv3 details and workarounds sections. |
Revision 1.0 |
2003-December-15 |
Initial public release. |
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.