Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.3312 Cisco Business 220 Series Smart Switches Static Key and Password Vulnerabilities 7 October 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco Business 220 Series Smart Switches Publisher: Cisco Systems Operating System: Cisco Impact/Access: Access Privileged Data -- Console/Physical Reduced Security -- Console/Physical Resolution: Patch/Upgrade CVE Names: CVE-2021-34757 CVE-2021-34744 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco Business 220 Series Smart Switches Static Key and Password Vulnerabilities Priority: Medium Advisory ID: cisco-sa-sb-hardcoded-cred-MJCEXvX First Published: 2021 October 6 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvy90709 CSCvy90713 CVE Names: CVE-2021-34744 CVE-2021-34757 CWEs: CWE-540 Summary o Multiple vulnerabilities in Cisco Business 220 Series Smart Switches firmware could allow an attacker with Administrator privileges to access sensitive login credentials or reconfigure the passwords on the user account. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX Affected Products o Vulnerable Products At the time of publication, these vulnerabilities affected Cisco Business 220 Series Smart Switches if they were running a vulnerable firmware release and had the web-based management interface enabled. The web-based management interface is enabled through both HTTP and HTTPS by default. Determine the Device Configuration To determine whether the web-based management interface is enabled through either HTTP or HTTPS, use the show running-config command on the device CLI. If both of the following lines are present in the configuration, the web-based management interface is disabled and the device is not affected: no ip http server no ip http secure server Any other output indicates that the web-based management interface is enabled on the device. In the web-based management interface, the HTTP service and HTTPS service are configured under Security > TCP/UDP Service . Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by these vulnerabilities. Details o The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit the other vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerability. Details about the vulnerabilities are as follows: CVE-2021-34757: Cisco Business 220 Series Static Password Vulnerability A vulnerability in Cisco Business 220 Series Smart Switches firmware could allow an authenticated, physical attacker to obtain higher privileges on an affected device. This vulnerability is due to the use of a static password in all Cisco Business 220 Series Smart Switches firmware. An attacker with Administrator privileges could exploit this vulnerability by logging in to a serial interface and accessing encoded passwords. A successful exploit could allow the attacker to obtain and reconfigure user account passwords. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvy90709 CVE ID: CVE-2021-34757 Security Impact Rating (SIR): Medium CVSS Base Score: 5.5 CVSS Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N CVE-2021-34744: Cisco Business 220 Series Static Key Vulnerability A vulnerability in Cisco Business 220 Series Smart Switches firmware could allow an authenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to the use of a static cryptographic key in all Cisco Business 220 Series Smart Switches firmware images. An attacker with Administrator privileges could exploit this vulnerability by logging in to the web-based management interface and accessing encrypted passwords. A successful exploit could allow the attacker to obtain sensitive login credentials for other applications. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Bug ID(s): CSCvy90713 CVE ID: CVE-2021-34744 Security Impact Rating (SIR): Medium CVSS Base Score: 4.9 CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N Workarounds o There are no workarounds that address these vulnerabilities. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Fixed Releases At the time of publication, the release information in the following table (s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. The left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerabilities described in this advisory and which release included the fix for these vulnerabilities. Cisco Business 220 Series Smart Switches Firmware First Fixed Release Release 1.2.0.6 and earlier 1.2.1.2 The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory. Exploitation and Public Announcements o The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. Source o Cisco would like to thank security researcher Jasper Lievisse Adriaanse for reporting these vulnerabilities. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-hardcoded-cred-MJCEXvX Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-OCT-06 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYV4/5ONLKJtyKPYoAQjcjg/6Au05glLVUBBCxrEyYIhKrHU5+OUJceYY DWarjUylGZQOhuItNkD8e/ItX3jGclpq+S0oQJgRVN2zI9JLKI0dxjbQkpknleQ3 RjvPp2Oz1mTCT8Lu+HZZUi/KCn+iT78kxR1ShojIG8lp6Gs0nLolmaPufYzkX45D 81xIvZr/n8DeW8t95433F/9g03UWaxouomFSUtRN0c7ZM4FiCVtEalusm0B6lpvA B8y44T7cguC2N3OalG31H5dR7ZY3/oN7Ml4AR1f/kZsOpmyS6ifPT8xVWuMeiV9i KkItDt5DHYiw0W8WkzF2uu2G01oVEY0I+lK8G8JZZ1GMATZ5PHinbEr0utIR9hpZ jN3i6nhmk3+P6BGnWs0CbR06ag6mhoqVYzVWOL29p9F0l7iiuvAds2w1cjmQ5IJK B+0qU74osuE5DeYU0GAg1CoFxugDELOPOYogxlStVu4AYxw1CY7dl8RybSJ0hywD OCGFUoyqWRvF3kJjVJ+Vc9QK4G1iDOcrvft7FVg9KQMkasKTl5kDH7vuRk90wR/e so8jM7xLhAAtB8mLh2RHKXuU6SmqQ/Vv7OYNV85UNbK1xOUk3V8iYaAO33voMXtM FCxCx9V6MGyA3MISt4PGge0rnkLc9VtFKdmtlOkhlglLNuATYqYrN1qjI1NKcpkj 4jYR/wvH9Tw= =xf1V -----END PGP SIGNATURE-----