Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Bug Businesses Privacy Wireless Networking

'Hard-To-Fix' Cisco Flaw Puts Work Email At Risk (bbc.com) 47

An anonymous reader quotes a report from the BBC: Security researchers have discovered serious vulnerabilities affecting dozens of Cisco devices. The flaws allow hackers to deceive the part of the product hardware that checks whether software updates come from legitimate sources. Experts believe this could put emails sent within an organization at risk as they may use compromised routers. Messages sent externally constitute less of a risk, however, as they tend to be encrypted. The California-based firm said it is working on "software fixes" for all affected hardware.

"We've shown that we can quietly and persistently disable the Trust Anchor," Red Balloon chief executive Ang Cui, told Wired magazine. "That means we can make arbitrary changes to a Cisco router, and the Trust Anchor will still report that the device is trustworthy. Which is scary and bad, because this is in every important Cisco product. Everything." Security experts believe that the vulnerability could cause a major headache for Cisco, which has listed dozens of its products as vulnerable on its website. "We don't know how many devices could have been affected and it's unlikely Cisco can tell either," said Prof Alan Woodward, a computer security expert based at Surrey University. "It could cost Cisco a lot of money."
Security firm Red Balloon has set up a website with more details on the vulnerabilities, which they are calling "Thrangycat."
This discussion has been archived. No new comments can be posted.

'Hard-To-Fix' Cisco Flaw Puts Work Email At Risk

Comments Filter:
  • by MikeDataLink ( 536925 ) on Tuesday May 14, 2019 @05:17PM (#58593360) Homepage Journal

    Not that that makes it a "good" vulnerability. But I don't generally get excited about exploits that require the attacker to already have my root credentials. If s/he's got that I am already screwed.

    • by Anonymous Coward

      This is a two part attack. Gaining root is the easy part. The second part achieves persistence despite the presence of a TPM / UEFI type of chip on the board.

      https://www.wired.com/story/cisco-router-bug-secure-boot-trust-anchor/

      The lesson to be learned is that TPM / UEFI schemes don't work. Chip embedded management engines don't work either.

      Trust is not an option anymore. We need the ability to view and verify our entire systems. We need open hardware specifications coupled with open software solutions

  • ... the vulnerabilities, which they are calling "Thrangycat."

    Y tho?

  • The headline is total bullshit; this is only remotely related to email.

    TL;DR: Cisco implements a "hardware" security device based around an FPGA, and the unencrypted FPGA bitstream is vulnerable to remote tampering.

    The real WTFs are that (a) the bitstream is unencrypted and (b) is stored in flash that's accessible to the main CPU.

Keep up the good work! But please don't ask me to help.

Working...