Vulnerability: Cisco PIX Firewall Manager

From: Florencio Umel (fumelat_private)
Date: Wed Oct 10 2001 - 19:48:02 PDT

  • Next message: Geoff Hutchison: "Re: [CLA-2001:429] Conectiva Linux Security Announcement - htdig"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    Security Alert
    Cisco PIX Firewall Manager Vulnerability
    10 October 2001
    
    Synopsis:
    
    Novacoast has discovered a vulnerability in the Cisco 
    PIX Firewall Manager software that exposes and 
    records the enable password of the managed PIX 
    device in plaintext.  Attackers may use this 
    vulnerability to obtain full access to the PIX firewall.
    
    Description:
    
    The PIX Firewall Manager (PFM) is a software 
    product that allows the configuration of Cisco PIX 
    Firewall devices via a web-based GUI. PFM is 
    installed and run on a standard Windows NT 
    workstation or server that serves as the management 
    station. There is a flaw in PFM that upon successful 
    connection to a PIX device, the enable password is 
    saved in plaintext on the management station. The 
    password is recorded in an unencrypted log file 
    stored in a directory created by the install, which by 
    default has no access restrictions. If the 
    management station is compromised, the attacker 
    can retrieve the enable password. This, of course, 
    can be then be used to grant full access to the PIX 
    Firewall.
    
    Affected Versions:
    
    The tested version is PFM 4.3(2)g. Although the 
    vulnerability is not dependent on the version of the 
    PIX Firewall, this exploit was found with a PIX 5.2(1).
    
    Exploit:
    
    1) Install PFM as instructed.
    2) Run PFM, and connect to the PIX firewall with the 
    correct IP and enable password.
    3) Wait for PFM to finish gathering data from the 
    firewall.
    4) A PFM.LOG file is created, by default in C:\Program
    Files\Cisco\PIX Firewall Manager\protect.
    5) The enable password is stored in plaintext in an 
    entry that looks like:
    Aug 01 2001 14:59:18 <Receiving msg> - 9004 
    192.168.1.100 0 0 0 1 5 **enable_pswd_here**
    
    Recommended Solution:
    
    Cisco has stated that PFM should be replaced by the 
    PIX Device Manager product, and thus a fix for this 
    exploit will not be made available. Further product 
    information is located 
    here:http://www.cisco.com/warp/public/cc/pd/fw/sqfw
    500/prodlit/pixdm_ds.htm
    
    Note that an attacker can only successfully use this 
    exploit if they can compromise the management 
    station on which PFM is installed. Admins should take 
    care that the PFM station, and the inside network on 
    which it resides, should be properly protected behind 
    the PIX firewall. Steps should also be taken to 
    lockdown the management station as best as 
    possible as there exists a number of exploits for the 
    NT platform. If PFM is to be used, restrict the access 
    rights for the directory in which PFM.LOG resides. 
    After connecting to a PIX using PFM, edit the 
    PFM.LOG, search for your PIX enable password, and
    manually delete it. (Or delete the file itself as it does 
    not appear to be essential for the proper function of 
    PFM).
    
    Status:
    
    This bug has been submitted to and acknowledged 
    by the Cisco product security incident response 
    team.  Cisco will release a report regarding this 
    vulnerability to its customers.
    
    The response from Cisco Product Security IRT:
    
    Cisco strongly recommends that users of its security 
    and other products maintain a process to update the 
    software on their devices and track security related 
    developments in regard to their network environment 
    to maintain and improve their security posture.
    
    In regards to this specific exploit, Cisco recommends 
    the following response:
    
    Upgrade the software on the PIX device to the version 
    6.0 or higher.
    Deinstall PIX Firewall Manager from the NT 
    workstation. Begin using PIX Device Manager for GUI 
    management of the PIX device.
    
    - - If, for any reason, a customer is not willing or able 
    to upgrade for whatever reason, we suggest the 
    following:
    
    - - Secure the NT workstation running PFM as 
    described above.
    
    Regardless of steps taken to address this specific 
    issue, Cisco *strongly* recommends that all 
    organizations restrict physical and electronic access 
    to all network management stations of any sort as a
    standard operational process. While a management 
    station may be on a network protected by an Internet 
    Firewall such as PIX, all internal systems should as a 
    rule be additionally protected from other avenues of 
    attack including but not limited to social engineering, 
    internal threats and external access by means other 
    than the firewalled Internet gateway (i.e. modem 
    pools, network fax machines...).
    
    Disclaimer:
    
    Novacoast accepts no liability or responsibility for the 
    content of this report, or for the consequences of any 
    actions taken on the basis of the information provided 
    within. Dissemination of this information is granted 
    provided it is presented in its entirety. Modifications 
    may not be made without the explicit permission of
    Novacoast.
    
    - - Florencio Umel, Jr., Engineer
    - - Novacoast International Inc.
    Email: fumelat_private
    Web: http://www.novacoast.com
    
    
    -----BEGIN PGP SIGNATURE-----
    Version: PGP 7.0.1
    
    iQA/AwUBO8UHedteKEr+r8z4EQISbACgnrkDrwKLp
    hj0ot4mNytCWri/vv4AoM+5
    aQ8jtxzRJPF63GqYMrSIuqYU
    =DIx/
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Thu Oct 11 2001 - 06:35:25 PDT