Cisco Security Appliances Found To Have Default SSH Keys 112
Trailrunner7 writes: Many Cisco security appliances contain default, authorized SSH keys that can allow an attacker to connect to an appliance and take almost any action he chooses. The company said all of its Web Security Virtual Appliances, Email Security Virtual Appliances, and Content Security Management Virtual Appliances are affected by the vulnerability.
This bug is about as serious as they come for enterprises. An attacker who is able to discover the default SSH key would have virtually free reign on vulnerable boxes, which, given Cisco's market share and presence in the enterprise worldwide, is likely a high number. The default key apparently was inserted into the software for support reasons.
"The vulnerability is due to the presence of a default authorized SSH key that is shared across all the installations of WSAv, ESAv, and SMAv. An attacker could exploit this vulnerability by obtaining the SSH private key and using it to connect to any WSAv, ESAv, or SMAv. An exploit could allow the attacker to access the system with the privileges of the root user," Cisco said.
This bug is about as serious as they come for enterprises. An attacker who is able to discover the default SSH key would have virtually free reign on vulnerable boxes, which, given Cisco's market share and presence in the enterprise worldwide, is likely a high number. The default key apparently was inserted into the software for support reasons.
"The vulnerability is due to the presence of a default authorized SSH key that is shared across all the installations of WSAv, ESAv, and SMAv. An attacker could exploit this vulnerability by obtaining the SSH private key and using it to connect to any WSAv, ESAv, or SMAv. An exploit could allow the attacker to access the system with the privileges of the root user," Cisco said.
Oh come ON (Score:2)
Was THIS the way you finally managed to get off ssh1, Cisco?
Re:Using Linux would prevent these Cisco mishaps! (Score:5, Informative)
Cisco is very much a "configure it yourself" type of deal. In fact their whole certification track above the CCENT level revolves heavily around knowing the IOS command syntax.
You can substitute their routers for Linux, but NOT their layer 3 switches, unless you really don't give a shit about performance in an enterprise environment.
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
A Cisco Nexus is pretty Linux.
Re: (Score:2)
Yeah, pretty much all of Ubiquiti's gear is. Edgeswitch, in particular, in this case.
Re: (Score:1)
Juniper's OS is based on freebsd.
Re: (Score:2)
There are lots of switches running linux. Of course, linux isn't the thing doing the switching.
The question to ask is can you get to the OS and/or ssh configuration to remove whatever the vendor may have installed? (i.e. remove whatever ssh backdoor keys they left there.) In most cases, the answer is "Hell. No."
Re: (Score:2)
Re: (Score:3)
http://cumulusnetworks.com/blo... [cumulusnetworks.com]
http://www.datacenterknowledge... [datacenterknowledge.com]
http://opennetlinux.org/ [opennetlinux.org]
http://www.opencompute.org/ [opencompute.org]
http://www.wired.com/2013/03/b... [wired.com]
Get with the times, the Big Iron Networking gear (like usead at Google and Facebook) are switches running Linux.
Re: (Score:2)
Quite a difference between using any old Linux server as a router, and using an actual device that is purpose built for that which includes an ASIC to make faster and more efficient forwarding decisions.
Re: (Score:2)
A layer 3 switch is a fucking router. It's called a layer 3 switch because it's a fucking shitty router.
Switches are layer 2.
Re: (Score:2)
It is a router that can *route* packets among all interfaces at full speed. Get a Linux box with 16 NICs and flood them with traffic. See it sizzling, smoking and crashing.
Oh fuck off with that bullshit. Routing packets takes minimal CPU, so fuck off with your sizzling and smoking horse shit. Full fledged routers are much more capable than "layer 3 switches".
Re: (Score:2)
Poverty = ignorance. Have you ever touched anything not sold in Bestbuy?
I think it's worse than that. He's a real life Nelson "Big Head" Bighetti. Makes himself look knowledgeable but is really just fucking worthless.
Re: (Score:1)
Re: (Score:2)
A "layer 3 switch" has minimal routing features and is only a "great router" if you don't need to do much routing and thus don't want to spend money on an actual router.
Re: (Score:2)
A layer 3 switch is in many ways better than a router because it makes forwarding decisions in hardware. Meanwhile dedicated routers don't offer any big advantages over a layer 3 switch unless you happen to be using old shit like frame relay where you need special WICs and can't use ordinary ethernet or SFP adapters.
Re: (Score:2)
Dedicated routers offer same-or-better performance and capacity of a "layer 3 switch", and give you FULL layer 3 traffic control, not the half-assed firewalling, prioritization, etc. that "layer 3 switches" provide (at slow fucking speed).
"Layer 3 Switch" is a marketing term for "half-assed router", and nothing more. If they were as capable as routers they'd be called routers because they'd fucking be routers. It's just like "smart managed switch", which means you get a semi-functional web interface (and
Re: (Score:2)
Wow. Not only is everything you said way wrong (way way way WAY wrong,) but it's also approaching retardation.
In fact, I strongly recommend there be a restraining order to prevent you from going anywhere within a mile of any enterprise grade network. You're of those guys who talks down to other employees at IT shops while always being the biggest cause of down time. 100% Dunning-Kruger.
Re: Using Linux would prevent these Cisco mishaps! (Score:2)
Except the 'security appliance' line does not run IOS. These are servers (originally re-badged Dell PowerEdge, but now Cisco UCS C-class rack-mounts) running AsyncOS (a proprietary FreeBSD-based platform), which used to be branded as Ironport.
It doesn't seem to affect any IOS flavour (IOS, IOS-XE which is Linux-based, IOS-XR) or the Nexus NX-OS (Linux-based).
Re: (Score:1)
You mean like everyone who had to replace their Debian-generated SSL keys due to bad (practically nonexistent) PRNG seeding?
Beware 'appliances' (Score:2)
This is the example of precisely how disciplined the 'appliances' you get from vendors are constructed.
This is a *security* focused appliance that made this goof from one of the more well regarded vendors in the market.
Think about that next time you save a few seconds of your time buying an appliance or even pulling down something from dockerhub instead of just installing the platform.
Of course the software industry has gone to town with appliances, meaning they spend no time properly packaging things anymo
Re:Beware 'appliances' (Score:5, Interesting)
If cisco didn't use interns and cheap H1B labor, maybe this wouldn't happen. Seriously, they need some experience, security minded people to manage and review these products before they ship.
If you think this is bad, try looking at the cisco ACE load balancers. They can't even do modern crypto and they refuse to update them.
Are you kidding? This was done for support reasons; to support the NSA.
Re: Beware 'appliances' (Score:1)
Excatly. Key is right where NSA told Cisco to put it.
It's a *feature,* not a bug.
Re: (Score:2)
Yeah, that's it, NSA wanted Cisco to do something so stupid it would take the Chinese 2 minutes to figure out how holey their boxes are.
Re: (Score:3)
Yeah, that's it, NSA wanted Cisco to do something so stupid it would take the Chinese 2 minutes to figure out how holey their boxes are.
I don't get the impression that the NSA really think things like this through to that extent.
Re: (Score:1)
No way in Hades would Cisco "accidentally" insert a secret backdoor into so much enterprise hardware unless forced to do so. Putting aside layers upon layers of code review for something that big to happen Cisco management well know you don't do that to enterprise customers. I'm surprised post-Snowden so many people are still in denial the NSA is indeed trying to put backdoors in everything. It's not tinfoilhat.
Re: Beware 'appliances' (Score:1)
Re: (Score:2, Troll)
Re: (Score:2)
Just out of curiosity, what do you think the proper homonym phrase is for this?
Re: Interesting eggcorn (Score:3)
It should be "free rein". It refers to the reins used to direct the travel of a horse similarly to the way "steering wheels" were used to direct the motion of automobiles before Google acquired a majority stake on the US Supreme court and self-driving cars became mandatory.
Anyway, If you were to release your grip on the reins, then the horse may theorectically feel free to travel in any direction. In practice the horse generally returned to the barn after scraping the rider off on the nearest tree.
Re: (Score:3)
Re: (Score:2)
The correct figure of speech is "free rain."
Nope, the correct figure of speech is "Free Ryan.":
From Wikipedia: "In September 2013, the first book about the Ryan Ferguson case was released: Free Ryan Ferguson: 101 Reasons Why Ryan Ferguson Should Be Released, by Brian D'Ambrosio."
Re: (Score:2)
Just out of curiosity, what do you think the proper homonym phrase is for this?
From grammarist.com it should be "free rein" as in a horse being able to do what they want because the reins are free. "reign" is a recent misspelling that is being used more often.
Re: (Score:3)
This is a *security* focused appliance that made this goof from one of the more well regarded vendors in the market.
"Goof?" I'm not convinced. It's just as likely that this was engineered into the products intentionally.
News broke last year that NSA was intercepting Cisco equipment [arstechnica.com] enroute to customers and making a few tweaks. Cisco made a big production a few months ago about how they were suddenly willing to ship to random addresses [schneier.com] to avoid NSA interdiction. Perhaps that's because whatever NSA needs is already built in, and always has been, and the whole story about NSA physically yanking packages from carriers was mi
Re: (Score:2)
Why invent some NSA conspiracy when Cisco clearly said it was intentional for support purposes?
The default key apparently was inserted into the software for support reasons.
Re: (Score:3)
for support reasons
You're not asking the correct question.
"To support whom?"
Re: (Score:1)
Anyone that doesn't think the NSA was involved is extremely gullible. Cisco is the biggest networking company in the world. They serve governments and large corporations around the planet which all expect transparency and security. Cisco's management, engineers, programmers and it their cats could speak.... all know beyond a shadow of a doubt you don't insert secret default backdoors into enterprise hardware. Code review would have detected such a glaringly obvious "bug" long before it was inserted into th
NSA? (Score:4, Insightful)
Re: (Score:2)
Yes, that's exactly what they said. It was added to support the NSA. Oh, did you think "support reasons" meant support for their customers? How quaint! ;)
How (Score:2)
is this a bug?
default, authorized SSH keys
Barracuda Backup, too! (Score:1)
https://techlib.barracuda.com/... [barracuda.com]
You can't change the keys, so if you want to use SSHFS to backup systems that aren't agent supported, you've potentially given root access to anyone who's extracted the private key from the appliance (and leaked it to the internet). I wouldn't be surprised if the agents used the same craptastic cryptographic fail.
Re: (Score:2)
To be fair, they allow you to use non-root users. And if you dont have a firewall rule to only allow SSH from the backup master, then you're an idiot.
Odd how little criticism they get (Score:2)
Re: (Score:1)
Its because of the "no one has ever lost a job buying Cisco" attitude that is so prevalent in the industry, many engineers drank the cool aid long ago and don't want to admit that Cisco is not completely infallible.
Almost every network engineer I know has some sort of Cisco certification, people have to continue to justify the heft price for the hardware and the expensive certifications.
Re: (Score:2)
Quite honestly, I think a lot of people understand they are complete, overpriced shit. Unfortunately, the competitors appear to be mainly moderately or reasonably priced shit from a security perspective. The question comes down to accountability for the person purchasing/configuring it: can you at least say it was a best-of-breed device and was properly configured for an appropriate level of security, or will you need to say that the purchasing decision was made to save $400 and buy something else...
It se
Similar to having default passwords (Score:1)
How many home routers have default passwords that aren't forcibly changed when the router is first set up?
It's the same principle, with the only difference being it is something that has to be discovered by someone, once, rather than guessed like so many easy-to-guess default passwords ("admin", "password", etc.).
The other difference is that one should expect better from a device that is specifically marketed as a security device. But that's a social issue not a technical one.
You must have the source code! (Score:5, Interesting)
This class of bug is unknown in the free software world because your project will forked.
All corporations are subject to enormous pressure from corporations, and therefore can not be trusted, even if the management wanted to play it straight.
All populations, including the U.S'es are targets of information warfare by the NSA and GCHQ.
There is no security without the source code.
Re:You must have the source code! (Score:5, Insightful)
Re: (Score:1)
Re: (Score:1)
Bug???? (Score:5, Insightful)
This isn't a bug.
This is crap security by design.
And you can probably bet that the NSA and the Chinese have these keys, and can pretty much bypass any "security" offered by Cisco.
Essentially Cisco did this shit on purpose, and you can bet at least some people knew damned well this was there.
Exactly (Score:4, Insightful)
Do you know how many times I thought about adding a back channel to a piece of software I wrote because it's easier than training users? Do you care to guess at how many times I have actually done this?
Lets ask that same question about smaller software companies. You won't find any that survive for long after people find out they have these kinds of security practices.
It's hard to say why this happens so frequently and massively with large companies/corporations. I'm sure it's partly Government pressure, probably pressure from other companies/corporations, and partly an ignorant executive demanding this gets done. I'm sure the latter can claim the first two are the problem. The latter however, should result in termination of the execs responsible. That last part does not happen, which makes me wonder how big the first two really are.
Re: (Score:1)
Re: (Score:1)
"And you can probably bet that the NSA and the Chinese have these keys"
We know at minimum the NSA has them.,.. because it was the NSA that told Cisco to put them there!
This isn't like accidentally spilling a coffee. The firmware of hundreds of thousands of devices doesn't "accidentally" get secret backdoors. Cisco wouldn't jeopardize billions in future sales without being forced to do so by an NSA. What I'm curious to know is the real story behind why they are suddenly telling us now? (rather than the scri
Occams Electric Shaver (Score:2)
Never attribute activity to nefarious government agencies to what can be more easily explained by clueless MBA PHBs demanding their own personal screendoor.
Not a bug (Score:2)
I believe the problem here is that they thought they could get away including the "lawful interception" (i.e. "immoral and dangerous backdoor") key just by the ordinary mechanism instead of compiling it into the sshd binary.
Time to yank NSA's leash (Score:5, Interesting)
Re: (Score:1)
Re: (Score:1)
Cisco security appliances contain default SSH keys (Score:2)
Get a grip guys (Score:1)