Date: 09 January 2006
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2006.0011 -- [Win][Cisco]
Cisco Secure ACS for Windows Downloadable IP Access Control
List Vulnerability
9 January 2006
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Cisco Secure Access Control Server for Windows 3.0 to 3.3.3
PIX 6.3
PIX/ASA 7.0
FWSM
VPN3000
Publisher: Cisco Systems
Operating System: Windows
Cisco IOS
Impact: Inappropriate Access
Access: Remote/Unauthenticated
CVE Names: CVE-2005-4499
Original Bulletin:
http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_field_notice09186a00805bf1c4.shtml
- --------------------------BEGIN INCLUDED TEXT--------------------
Field Notice: FN - 61965 -
CS ACS for Windows Downloadable IP Access Control List Vulnerability
Document ID: 68484
December 27, 2005
NOTICE:
THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY
KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY.
YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM
THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE
OR UPDATE THIS FIELD NOTICE AT ANY TIME.
Products Affected
Product Comments
VPN3000 -
CVPN3002 -
FWSM -
PIX 6.3
ACS - 3.0WN2K -
ACS - 3.1WN2K -
ACS - 3.2WN2K -
ACS - 3.3WN2K Application and Appliance
ASA - 7.0 7.0(1)
Problem Description
The Downloadable IP Access Control List (ACL) feature found in Cisco
Secure Access Control Server (CS ACS) for Windows versions 3.0 through
3.3.3 may allow an unauthorized user to gain network access through
a Remote Access Server or Network Access Server (RAS/NAS).
This issue has been resolved in CS ACS Version 4.0.1 as well as PIX
version 6.3(5), PIX/ASA 7.0(2), Cisco IOS Software Version 12.3(8)T4
and VPN 3000 versions 4.0.5.B and 4.1.5.B. FWSM is under investigation
and while not resolved, there is a workaround to mitigate the issue.
The software fix has rendered the newer version of CS ACS incompatible
with the earlier version of the RAS/NAS software. Customers utilizing
Downloadable IP ACLs who upgrade ACS to versions 4.0.1 or later must
also upgrade any RAS/NAS device software at the same time in order
to resolve this issue.
If the ACS server is upgraded to software version 4.0.1 or later
before the RAS/NAS devices are upgraded, all Downloadable IP ACL
requests will be declined. However, no harm will result to Downloadable
IP ACL functionality if the RAS/NAS devices are upgraded to the new
software before the ACS server software is upgraded. In either case,
normal RADIUS user authentication will not be affected.
Background
CS ACS Server for Windows version 3.0 introduced the Downloadable
PIX ACL feature which allows for user-specific ACLs to be downloaded
to a PIX Firewall. CS ACS Server for Windows version 3.2 broadened
the supported range of RAS/NAS devices to include IOS routers as
well as VPN 3000 concentrators and the feature was renamed to
Downloadable IP ACL.
Communication between the RAS/NAS device and ACS server takes place
using the standard RADIUS (PAP) protocol in a manner very similar
to typical RADIUS user authentication. The ACL name to be downloaded
is placed in the "User-Name" RADIUS attribute but otherwise the
request appears to be a typical user authentication request. When
the ACS server receives the request and determines that the "User-Name"
is one of its configured downloadable IP ACLs it responds with the
ACL content in an "Access-Accept" RADIUS packet.
If a malicious attacker knows the name of a Downloadable IP ACL
configured on the ACS server they may use the name of that ACL as
their user name when prompted to provide credentials by a RAS/NAS.
When the ACS server receives the authentication request from the
RAS/NAS it believes that it is a request to recieve the specified
ACL (rather than a user authentication request) and responds with a
typical RADIUS "Access-Accept" message in addition to the ACL. When
the RAS/NAS receives this response it interprets it to be permission
to access the network and grants the attacker access.
This vulnerability is very unlikely to be exploited for several
reasons in the ACS 3.3.3 code and has been resolved in the 4.0.1
code. However, in order to implement this fix the behavior of
downloadable ACLs was changed and other software had to be updated
to work with this change.
Learning the Downloadable IP ACL names is very difficult:
There are three potential sources where the attacker might find out
the names of existing downloadable ACLs.
1. Sniff the RADIUS traffic between the RAS/NAS and ACS server.
This means that the attacker must have access to the network
traffic between the RAS/NAS and ACS server.
2. Browse the ACS server configuration. For this the attacker
must be an ACS administrator with read privileges or have
otherwise compromised the ACS server. Also, a Downloadable IP
ACL name shown on the ACS user interface is different from the
"User-name" sent by the device. The attacker also must understand
the how the time stamp is built as well as the exact server
machine time at which the ACL was last edited in order to
properly determine the exact "User-name" to be used.
3. Browse the RAS/NAS server configuration. Run the show run or
similar command on RAS/NAS device in enabled mode to determine
the names of all downloadable ACLs in use. Similar to the above
condition, the attacker must be a RAS/NAS administrator with
read priviliages or have otherwise compromised the RAS/NAS
server.
The Downloadable IP ACL names changes dynamically:
1. Editing the Downloadable IP ACLs on the ACS server even if no
change is made will result in a new ACL name being generated.
2. Re-starting the CSRadius (ACS) service will purge the cache
of all downloadable ACL names and force all ACLs to be renamed.
Problem Symptoms
If appropriate levels of AAA logging are enabled on the RAS/NAS
devices and/or ACS server then the use of Downloadable IP ACL names
as user names may be clearly identified. AAA log entries for the
RAS/NAS device as well as "passed authentication" log entries on the
ACS server would indicate that a user with a username based on a
Downloadable IP ACL requested and was granted network access.
Note: The user name utilized by the Downloadable IP ACL feature
contains more characters than the name used for the ACL in the ACS
management screen. It is preceeded by an ACS ACL identifier string
and followed by date and time stamp information. For example, a
Downloadable IP ACL created on the ACS Server with the name "IP-test"
will result in a user name such as "#ACSACL#-IP-test-40d050cd". AAA
logs containing passed authenticaion entries with user names formatted
like this are a clear indication that this issue has been exploited.
Below is a sample ACS "passed authentication" log with one entry
showing a Downloadable IP ACL user authentication in .csv format:
Date,Time,Message-Type,User-Name,Group-Name,Caller-ID,NAS-Port,NAS-IP-Address
02/08/2005,15:56:17,Authen OK,#ACSACL#-IP-test-40d050cd,Default Group,,,192.168.254.252
If the ACS server is upgraded to SW version 4.0.1 or later before
the RAS/NAS devices are upgraded as well, all Downloadable IP ACL
requests will be declined. However, no harm will result to Downloadable
IP ACL functionality if the RAS/NAS devices are upgraded to the new
software first. In either case, normal RADIUS user authentication
will not be affected.
Workaround/Solution
For VPN3000, FWSM, PIX, and ASA RADIUS, access-lists using the Cisco
AV Pair can be used instead of Cisco downloadable IP access-lists.
This Workaround is detailed under the specific product DDTS's.
For IOS, The only workaround is to disable the Downloadable IP ACL
feature. This will prevent the ACS from authorizing users with names
equivalent to Downloadable IP ACLs. RADIUS access-lists using the
Cisco AV pair are not a workaround for this issue.
If the ACS server is upgraded to SW version 4.0.1 or later before
the RAS/NAS devices are upgraded, all Downloadable IP ACL requests
will be declined. However, no harm will result to Downloadable IP
ACL functionality if the RAS/NAS devices are upgraded to the new
software before the ACS server software is upgraded. In either case,
normal RADIUS user authentication will not be affected.
The solution is to upgrade both the ACS server as well as all RAS/NAS
devices to the software releases that include the fix. In the newer
software releases the Downloadable IP ACL RADIUS requests have been
modified so that they may be distinguished from normal user
authentication requests.
If the ACS server is upgraded to software version 4.0.1 or later
before the RAS/NAS devices are upgraded, all Downloadable IP ACL
requests will be declined. However, no harm will result to Downloadable
IP ACL functionality if the RAS/NAS devices are upgraded to the new
software before the ACS server software is upgraded. In either case,
normal RADIUS user authentication will not be affected.
DDTS
To follow the bug ID link below and see detailed bug information,
you must be a registered user and you must be logged in.
DDTS Description
CSCin79018 (registered IOS: Potential ACL vulnerability in downloadable ACL
customers only) functionality integrated in 12.3(08)T04 and 12.3(10.02)T
CSCsc89235 (registered FWSM - Add support for new RADIUS VSA to mitigate
customers only) downloadable ACL issue
CSCeh22447 (registered ASA - Add support for new RADIUS VSA to mitigate
customers only) downloadable ACL issue
CSCee92021 (registered VPN 3000: Fix needed for Downloadable ACL security fix
customers only) w/ ACS integrated in 04.7(00) REL 04.0(05)B 04.1(05)B
CSCef21184 (registered PIX: Add support for new RADIUS VSA to mitigate
customers only) downloadable ACL issue. Integrated in 7.0.4
Revision History
Revision Date Comment
Revision 1.0 27-Dec-2005 Initial public release.
For More Information
If you require further assistance, or if you have any further questions
regarding this field notice, please contact the Cisco Systems Technical
Assistance Center (TAC) by one of the following methods:
* Open a service request on Cisco.com
* By email
* By telephone
Receive Email Notification For New Field Notices
Product Alert Tool - Set up a profile to receive email updates about
reliability, safety, network security, and end-of-sale issues for
the Cisco products you specify.
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBQ8IDSSh9+71yA2DNAQJB3AP9H0Mt9q8lKK8Tcn0ZsTtwhT3htF93w2nw
cg76e8HHwvP5gY/oaZ24FVK2jlqNORZsy3mxx4CBt74MesaMVVt/stSnNRxknKmM
XGnYTqzf0MDZuac9pc7+xtmKLVoxAcSBk7TixXtLgz7x4KlTD6KBmmg0AXZbQfA9
BQxDrSaYlNg=
=GxoD
-----END PGP SIGNATURE-----
|