Home ![](/web/20061025225029im_/http://psepc.gc.ca/world/site/images/spacer.gif) ![](/web/20061025225029im_/http://psepc.gc.ca/world/site/images/breadcrumb_arrow.gif) Programs ![](/web/20061025225029im_/http://psepc.gc.ca/world/site/images/spacer.gif) ![](/web/20061025225029im_/http://psepc.gc.ca/world/site/images/breadcrumb_arrow.gif) Emergency management ![](/web/20061025225029im_/http://psepc.gc.ca/world/site/images/spacer.gif) ![](/web/20061025225029im_/http://psepc.gc.ca/world/site/images/breadcrumb_arrow.gif) Response ![](/web/20061025225029im_/http://psepc.gc.ca/world/site/images/spacer.gif) ![](/web/20061025225029im_/http://psepc.gc.ca/world/site/images/breadcrumb_arrow.gif) CCIRC ![](/web/20061025225029im_/http://psepc.gc.ca/world/site/images/spacer.gif) ![](/web/20061025225029im_/http://psepc.gc.ca/world/site/images/breadcrumb_arrow.gif) Analytical releases2 ![](/web/20061025225029im_/http://psepc.gc.ca/world/site/images/spacer.gif) ![](/web/20061025225029im_/http://psepc.gc.ca/world/site/images/breadcrumb_arrow.gif) AV06-025: Unintentional Password Modification in Cisco Firewall Products
Number: AV06-025 Date: 23 August 2006 PurposeThe purpose of this advisory is to bring attention to a software bug in certain versions of the software for the Cisco PIX 500 Series Security Appliances, the Cisco ASA 5500 Series Adaptive Security Appliances (ASA), and the Firewall Services Module (FWSM) that may cause the EXEC password, passwords of locally defined usernames, and the enable password in the startup configuration to be changed without user intervention. AssessmentThe software issue may cause the EXEC password, password of locally defined users, and the enable password in the startup configuration to change without user's intervention. This will prevent administrators from logging in to the device if authentication is configured to use the passwords stored in the startup configuration. If a malicious user were able to guess the new password, and the device reloads, either automatically because of a software crash, or manually by the network administrator, unauthorized access to the device may be possible. Affected products Cisco PIX 500 Series Security Appliances, the Cisco ASA 5500 Series Adaptive Security Appliances, and the Firewall Services Module (FWSM) for the Cisco Catalyst 6500 Switches and Cisco 7600 Series Routers are impacted if they are running an affected software version. Vulnerable Products The PIX 500 Series Security Appliances and the ASA 5500 Series Adaptive Security Appliances are affected when running any of the following software versions: - Any version (including interim versions) in the 7.0(x) train up to and including 7.0(5)
- Any version (including interim versions) in the 7.1(x) train up to and including 7.1(2.4)
The FWSM for the Cisco Catalyst 6500 Switches and Cisco 7600 Series Routers is affected when running the following software version: - Any version (including interim versions) in the 3.1(x) train up to and including 3.1(1.6)
Products Confirmed Not Vulnerable The PIX 500 Series Security Appliances and the ASA 5500 Series Adaptive Security Appliances are not affected when running any of the following software versions: - Any pre-7.x version (PIX only since the ASA does not run pre-7.x code)
- 7.2(1) and later
The FWSM for the Cisco Catalyst 6500 Switches and Cisco 7600 Series Routers is not affected when running any of the following software versions: - Any 1.x and 2.x version
- 3.1(2) and later
No other Cisco products are currently known to be affected by this issue. Suggested actionPSEPC recommends that system administrators test and apply the latest security update as indicated for their supported product versions. For more information, please refer to: http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml Note to readersCanadian Cyber Incident Response Centre (CCIRC) collects information related to cyber threats to, and incidents involving, Canadian critical infrastructure. This allows us to monitor and analyze threats and to issue alerts, advisories and other information products. To report threats or incidents, please contact the Government Operations Centre (GOC) at 613-991-7000 or goc-cog@psepc-sppcc.gc.ca by e-mail. Unauthorized use of computer systems and mischief in relation to data are serious Criminal Code offences in Canada. Any suspected criminal activity should be reported to local law enforcement organizations. The Royal Canadian Mounted Police (RCMP) National Operations Centre (N.O.C.) provides a 24/7 service to receive such reports or to redirect callers to local law enforcement organizations. The N.O.C. can be reached at 613-993-4460. National security concerns should be reported to the Canadian Security Intelligence Service (CSIS) at 613-993-9620. For urgent matters or to report any incidents, please contact the Government Operations Centre at: Phone: 613-991-7000 Fax: 613-996-0995 Secure Fax: 613-991-7094 Email: goc-cog@psepc-sppcc.gc.ca For general information on critical infrastructure protection and emergency preparedness, please contact PSEPC's Public Affairs division at: Telephone: 613-944-4875 or 1-800-830-3118 Fax: 613-998-9589 E-mail: communications@psepc-sppcc.gc.ca
|