Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Cisco :: cisco50.htm

Cisco Aironet 340 Series Wireless Bridge - view and modify configuration



Vulnerability

    Cisco

Affected

    Cisco Aironet 340 Series Wireless Bridge

Description

    Following is based on a Cisco Security Advisory.  It is possible
    to view and  modify the bridge's  configuration via Web  interface
    even  when  Web  access  is  disabled  in the configuration.  This
    defect is documented as Cisco  bug ID CSCdt52783.  This  defect is
    present in the following hardware models:

        * Aironet AP4500,
        * Aironet AP4800,
        * Aironet BR100,
        * Aironet BR500,
        * Cisco Aironet AIR-BR340

    The firmware release  8.55 is the  first image which  contains the
    fix.   All  previous  firmware  releases  for  listed  devices are
    vulnerable.   No other  Aironet/Cisco Aironet  wireless product is
    affect by this vulnerability.  This advisory is available at the

        http://www.cisco.com/warp/public/707/Aironet340-pub.shtml

    The following hardware models are affected:

        * Aironet AP4500,
        * Aironet AP4800,
        * Aironet BR100,
        * Aironet BR500,
        * Cisco Aironet AIR-BR340

    They are vulnerable to this defect if they are running any of  the
    following firmware releases:

        * 7.X
        * 8.07
        * 8.24

    It  is  possible  to  view  and modify the bridge's configuration,
    using Web interface, despite  it being explicitly disabled.   This
    vulnerability  is  exploitable  over  the  wired and wireless link
    alike.

    An attacker is able to  modify the bridge's configuration.   It is
    necessary for an  attacker to obtain  connectivity to the  bridge.
    That  can  be  done  either  using  wired  or  wireless   Ethernet
    interface.

Solution

    The release 8.55 is the first release where this vulnerability  is
    fixed.   No  other  Aironet/Cisco  Aironet  wireless  products are
    affected by this defect.

    There is no workaround if an attack is coming from wired  Ethernet
    interface.  To mitigate this vulnerability if an attack is  coming
    over the wireless link the following actions may be taken:

        * Change SSID to non guessable value
        * Turn on WEP encryption if possible
        * On  bridges  (BR100,  BR500  and AIR-BR340) turn off  access
          point mode.  That will disallow direct access to the  bridge
          by any client.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH