AV:N/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C
-
Cisco Small Business (SRP 500) Series Services Ready Platforms contain the following three vulnerabilities:
- Cisco SRP 500 Series Web Interface Command Injection Vulnerability
- Cisco SRP 500 Series Unauthenticated Configuration Upload Vulnerability
- Cisco SRP 500 Series Directory Traversal Vulnerability
Cisco has released software updates that address these vulnerabilities.
Workarounds that mitigate these vulnerabilities are available.
This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120223-srp500
-
Vulnerable Products
The following Cisco SRP 520 Series models are affected if running firmware prior to version 1.1.26:
- Cisco SRP 521W
- Cisco SRP 526W
- Cisco SRP 527W
The following Cisco SRP 520W-U Series models are affected if running firmware prior to version 1.2.4:
- Cisco SRP 521W-U
- Cisco SRP 526W-U
- Cisco SRP 527W-U
The following Cisco SRP 540 Series models are affected if running firmware prior to version 1.2.4:
- Cisco SRP 541W
- Cisco SRP 546W
- Cisco SRP 547W
Products Confirmed Not Vulnerable
No other Cisco products are currently known to be affected by these vulnerabilities.
-
Cisco SRP 500 Series devices are a flexible, cost-effective, fixed-configuration customer premises equipment (CPE) with embedded intelligence to enable service providers to create, provision, and deploy premium revenue-generating services to small businesses on an as-needed basis.
Cisco SRP 500 Series devices running affected versions of firmware contain the following three vulnerabilities. These vulnerabilities could be exploited from the local LAN side of the SRP device by default configuration and the WAN side of the SRP device if remote management is enabled. Remote management is disabled by default:
Cisco SRP 500 Series Web Interface Command Injection Vulnerability
Cisco SRP 500 Series devices contain a command injection vulnerability that could allow an authenticated session to inject commands to be executed by the operating system.
An attacker could exploit this vulnerability by either enticing an administrator to access a crafted link or by performing a man-in-the-middle attack to intercept an authenticated session. An exploit could allow the attacker to execute operating system commands on the device that are run in the context of the root user.
This vulnerability has been documented in Cisco bug ID CSCtt46871 (registered customers only) and has been assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2012-0363.
Cisco SRP 500 Series Unauthenticated Configuration Upload Vulnerability
Cisco SRP 500 Series devices contain an unauthorized access vulnerability that could allow an unauthenticated, remote attacker to upload an unauthorized configuration file.
An attacker could exploit this vulnerability by first creating a desired configuration file and then uploading it using the unauthenticated URL. An exploit could allow the attacker to alter the configuration of the Cisco SRP 500 Series device.This vulnerability has been documented in Cisco bug ID CSCtw55495 (registered customers only) and has been assigned CVE ID CVE-2012-0364.
Cisco SRP 500 Series Directory Traversal Vulnerability
Cisco SRP 500 Series devices contain a directory traversal vulnerability in the Local TFTP file upload application that could allow an authenticated, remote attacker to upload files to directories in the operating system of the Cisco SRP 500 Series device. An attacker could exploit this vulnerability by enticing an authenticated user to click on a crafted link or by installing malicious files on the FTP or HTTP server that the administrators of the device may use. An exploit could allow the attacker to install malicious software on the Cisco SRP 500 Series device to launch future attacks.
This vulnerability has been documented in Cisco bug ID CSCtw56009 (registered customers only) and has been assigned CVE ID CVE-2012-0365.
-
The Cisco SRP 500 Series devices are designed as CPE devices, and only disabling access from the outside network will prevent exploitation, from remote networks. The following mitigations help limit exposure to this vulnerability:
- Disable Remote Management
Caution: Do not disable remote management if administrators manage devices using the WAN connection. This action will result in a loss of management connectivity to the device.
Remote Management is disabled by default. If it is enabled, administrators can disable this feature by choosing Administration > Web Access Management. Change the setting for the Remote Management field to Disabled.
Disabling remote management limits exposure because the vulnerability can then be exploited from the inter-LAN network only.
- Limit Remote Management Access to Specific IP Addresses
If remote management is required, secure the device so that it can be accessed by certain IP addresses only, rather than the default setting of All IP Addresses. After choosing Administration > Web Access Management, an administrator can change the Allowed Remote IP Address setting to ensure that only devices with specified IP addresses can access the device.
- Disable Remote Management
-
When considering software upgrades, customers are advised to consult the Cisco Security Advisories and Responses archive at http://www.cisco.com/go/psirt and review subsequent advisories to determine exposure and a complete upgrade solution.
In all cases, customers should exercise caution to be certain the devices to be upgraded contain sufficient memory and that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, contact the Cisco Small Business Support Center or your contracted maintenance provider for assistance.
Affected Product
First Fixed Release
Cisco SRP 521W
1.1.26
Cisco SRP 526W
1.1.26
Cisco SRP 527W
1.1.26
Cisco SRP 521W-U
1.2.4
Cisco SRP 526W-U
1.2.4
Cisco SRP 527W-U
1.2.4
Cisco SRP 541W
1.2.4
Cisco SRP 546W
1.2.4
Cisco SRP 547W
1.2.4
The latest Cisco SRP 500 Series Services Ready Platforms firmware can be downloaded at http://www.cisco.com/cisco/software/navigator.html?mdfid=282736194&i=rm
-
The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.
These vulnerabilities were reported to Cisco by Michal Sajdak of Securitum, Poland.
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
-
Revision 1.0
2012-February-23
Initial public release
-
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.