Synopsis
In 2013, Tenable Network Security reported a file upload remote code execution flaw in Cisco IOS Smart Install Client via the Zero Day Initiative (ZDI), tracked by Cisco as CSCub55790. Based on subsequent testing, it appears this issue was not fully fixed in the patches released by Cisco. Cisco 2960G switches running c2960-lanbasek9-mz.150-2.SE8.bin (compiled on 14-May-15) are still vulnerable.
This vulnerability allows the attacker to replace the startup configuration file and the booting IOS image on Cisco switches running as a Smart Install client. The attacker can specify a user account with highest access in the config file, allowing her to take complete control of the switch. The attacker can also upload a custom IOS image with backdoors in it. If the attacker specifies an non-existent image list file or IOS image tar file(s) in the image list file, the IOS image file(s) will not be uploaded. In this case, the attacker-specified config file will still be uploaded to the switch, and that config file will be used as the startup config file on next reboot using the existing IOS image.
Based on testing, the fix in cisco-sa-20130327-smartinstall only addresses the IOS crash/reload caused by malformed content in the image list file. It does not prevent an attacker from uploading an attacker-specified config file to the switch. Moreover, if the attacker specifies a valid IOS image in the image list file, that image will be uploaded and the switch will reboot using that image and the attacker-specified config file.
Note: Tenable asked Cisco to assign a CVE ID on 8/20/2015. An assignment was given to us from Cisco on 8/25/2015 of CVE-2015-6264. When the Cisco advisory was published on 3/23/2016, it used CVE-2016-1349. As such, that is a duplicate assignment and further does not follow CNA standards, as the ID should be issued based on the year it was discovered/reported, not disclosed. MITRE has opted to REJECT CVE-2015-6264 per their policy as CVE-2016-1349 "is the most commonly referenced identifier".
Solution
Cisco has released "free software updates that address the vulnerability". Consult the cisco-sa-20160323-smi advisory for details.
Additional References
http://www.cisco.com/c/en/us/td/docs/switches/lan/smart_install/configuration/guide/smart_install/commands.htmlhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-smi
Disclosure Timeline
All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.
Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.
For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.
If you have questions or corrections about this advisory, please email [email protected]