{"id":17645,"date":"2020-02-05T10:45:16","date_gmt":"2020-02-05T18:45:16","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/05\/news-11380\/"},"modified":"2020-02-05T10:45:16","modified_gmt":"2020-02-05T18:45:16","slug":"news-11380","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/05\/news-11380\/","title":{"rendered":"Cisco Flaws Put Millions of Workplace Devices at Risk"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5e3a18d23130b10008e82c47\/master\/pass\/security-cisco_vulnerabilities-833300986_%20519329270.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 05 Feb 2020 16:56:40 +0000<\/strong><\/p>\n<p class=\"byline bylines__byline byline--author\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\"><span class=\"byline__name byline--with-bg\"><a class=\"byline__name-link\" href=\"\/contributor\/lily-hay-newman\">Lily Hay Newma<span class=\"link__last-letter-spacing\">n<\/span><\/a><\/span> <\/span><\/p>\n<p class=\"content-header__row content-header__dek\">Five vulnerabilities in Cisco Discovery Protocol make it possible for a hacker to take over desk phones, routers, and more.\u00a0<\/p>\n<p>Workplace phones and routers have a <a href=\"https:\/\/www.wired.com\/2014\/06\/desk-phone-hacks\/\">long<\/a>, <a href=\"https:\/\/www.wired.com\/story\/avaya-desk-phone-bug-defcon\/\">storied<\/a> history of very bad vulnerabilities. Now it&#x27;s time again to add to the list: Researchers say that a crop of <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.armis.com\/cdpwn\/&quot;}\" href=\"https:\/\/www.armis.com\/cdpwn\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">recently discovered flaws<\/a> in Cisco enterprise products\u2014like desk phones, web cameras, and network switches\u2014could be exploited to penetrate deep into corporate networks. Because Cisco <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.sdxcentral.com\/articles\/news\/cisco-continues-to-dominate-the-switch-router-markets\/2019\/03\/&quot;}\" href=\"https:\/\/www.sdxcentral.com\/articles\/news\/cisco-continues-to-dominate-the-switch-router-markets\/2019\/03\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">dominates<\/a> the network equipment market, the bugs impact millions of devices.<\/p>\n<p>All software has flaws, but embedded device issues are especially concerning given the potential for espionage and the inherent complexity of patching them. These particular vulnerabilities, found by the enterprise security firm Armis, can also break out of the &quot;segmentation&quot; IT managers use to silo different parts of a network, like a guest Wi-Fi, to cause widespread issues. Attackers could target a vulnerable Cisco network switch\u2014which moves data around an internal network\u2014to intercept large amounts of unencrypted, internal information and move between different parts of a target&#x27;s system. Attackers could use related flaws, also disclosed by Armis, to attack batches of Cisco devices at once\u2014like all the desk phones or all the webcams\u2014to shut them down or turn them into eyes and ears inside a target organization.<\/p>\n<p>\u201cNetwork segmentation is a key way to secure IoT devices,\u201d says Ben Seri, vice president of research at Armis. \u201cBut sometimes we can poke holes. And we know that enterprise devices are being targeted in the world. If they have this type of vulnerability, unfortunately that can be very powerful for a group like an APT.\u201d<\/p>\n<p>The flaws lie in the implementation of a mechanism known as the Cisco Discovery Protocol, which allows Cisco products to broadcast their identities to each other within a private network. CDP is part of a network&#x27;s &quot;Layer 2,&quot; which establishes the foundational data link between network devices. All devices use some sort of identity broadcasting mechanism, but CDP is Cisco\u2019s proprietary version.<\/p>\n<p>&quot;You\u2019re going to have to own a lot of devices, but once you own all of them you\u2019ve literally taken over every single piece of the network.&quot;<\/p>\n<p>Ang Cui, Red Balloon<\/p>\n<p>Separating Cisco products out by having them use CDP has some logistical benefits, but Seri points out that it also creates an easy way for attackers to find Cisco products once they&#x27;re inside a network. And since all Cisco products use CDP, one vulnerability can be used to automatically and simultaneously target many devices at once, or to take over crucial devices like network switches and move laterally from there. Any Layer 2 protocol can have bugs; vulnerabilities in CDP simply provide a particularly efficient route to attacking ubiquitous Cisco products.<\/p>\n<p>Armis disclosed its findings to Cisco at the end of August, and today the networking giant is releasing patches for all five vulnerabilities. There are so many because Cisco implements CDP in slightly different ways depending on the product; Armis found related bugs throughout the disclosure process and worked with Cisco to patch them all.<\/p>\n<p>&quot;On February 5, we disclosed vulnerabilities in the Cisco Discovery Protocol implementation of several Cisco products along with software fix information and mitigations, where available,&quot; a Cisco spokesperson said in a statement. &quot;We are not aware of any malicious use of the described vulnerabilities.&quot;<\/p>\n<p>To exploit the bugs, attackers would first need a foothold inside a target&#x27;s network, but from there they could fan out quickly, compromising one vulnerable Cisco device after another to bore deeper into a system. And once attackers controlled a switch or router they could start to intercept unencrypted network data, like files and some communications, or access a company&#x27;s &quot;active directory,&quot; which manages authentication for users and devices.<\/p>\n<p>\u201cIt\u2019s still hop by hop. As a hacker, you still need an initial attack vector into the network,\u201d says Ang Cui, founder of the IoT security firm Red Balloon, who has disclosed numerous Cisco bugs. \u201cBut once you\u2019re there, at each hop you have the same vulnerability present\u2014all the switches, firewalls, and routers in a network could be affected by this. So you\u2019re going to have to own a lot of devices, but once you own all of them you\u2019ve literally taken over every single piece of the network.\u201d<\/p>\n<p>Cui also notes that there&#x27;s a decades-long history of researchers discovering CDP vulnerabilities and calling attention to them, so Cisco can fix them before they&#x27;re ever exploited or to minimize exploitation. Concern about exploitation of such enterprise IoT bugs is not just theoretical. In August, researchers at Microsoft <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/msrc-blog.microsoft.com\/2019\/08\/05\/corporate-iot-a-path-to-intrusion\/&quot;}\" href=\"https:\/\/msrc-blog.microsoft.com\/2019\/08\/05\/corporate-iot-a-path-to-intrusion\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">spotted<\/a> suspected state-sponsored Russian hackers attacking desk phones, printers, and other office IoT devices to infiltrate corporate networks. And the Department of Homeland Security has <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.us-cert.gov\/sites\/default\/files\/c3vp\/Protecting_Enterprise_Network_Infrastructure_Webinar_Slides.pdf&quot;}\" href=\"https:\/\/www.us-cert.gov\/sites\/default\/files\/c3vp\/Protecting_Enterprise_Network_Infrastructure_Webinar_Slides.pdf\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">warned<\/a> about the importance of defending enterprise network infrastructure.<\/p>\n<p>While the patches Cisco has released are important, Seri notes that most of the vulnerable devices don\u2019t auto-update, and need manual patching to receive protection. That&#x27;s especially difficult on enterprise switches and routers, which need to be patched carefully so the process doesn\u2019t cause network downtime. There are also other mitigations companies can consider that involve disabling CDP on devices like switches, but this can eventually create other problems.<\/p>\n<p>Given the ubiquity of Cisco equipment in enterprise networks worldwide, though, the first step is always just getting fixes out there.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/cisco-cdp-flaws-enterprise-hacking\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5e3a18d23130b10008e82c47\/master\/pass\/security-cisco_vulnerabilities-833300986_%20519329270.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 05 Feb 2020 16:56:40 +0000<\/strong><\/p>\n<p>Five vulnerabilities in Cisco Discovery Protocol make it possible for a hacker to take over desk phones, routers, and more.\u00a0<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-17645","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17645"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17645\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17645"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}