[179433] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cisco Routers Vulnerability

daemon@ATHENA.MIT.EDU (George Herbert)
Mon Apr 13 18:12:19 2015

X-Original-To: nanog@nanog.org
In-Reply-To: <CAEwtr5rdrh+x6Hyc4VkL8FD0LHfBdAiiTfbtZ2t30d=LMRJn-w@mail.gmail.com>
Date: Mon, 13 Apr 2015 15:09:20 -0700
From: George Herbert <george.herbert@gmail.com>
To: Rashed Alwarrag <rali.ahmed@gmail.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

A whole pile of new vulnerabilities including remote code exploit were
revealed against specific models about 3 weeks ago; I had not heard of any
exploits, but, ...

Which is why the models and IOS versions would be very useful.

On Mon, Apr 13, 2015 at 2:59 PM, Rashed Alwarrag <rali.ahmed@gmail.com>
wrote:

> Still I don't have full information from them as it has been reported by
> different customers and all almost in the same time , I am trying to get
> some information about , I was just checking if there is known
> vulnerability has been announced recently regarding this
>
> Thanks you guys
>
>
> On Tuesday, April 14, 2015, Nick Hilliard <nick@foobar.org> wrote:
>
> > On 13/04/2015 23:48, Rashed Alwarrag wrote:
> > > It's reported by different customers in different locations so I don't
> > > think it's password compromised
> >
> > Have you checked?  If the routers had vty access open (ssh or telnet) and
> > the passwords were easy to guess, then it's more likely that this was a
> > password compromise.  You can test this out by getting a copy of one of
> the
> > configs and decrypting the access password.  Or by asking your customers
> > whether their passwords were dictionary or simple words.
> >
> > It's possible that there was a remotely accessible vulnerability, but ios
> > isn't known for this.
> >
> > Nick
> >
> >
> >
>
> --
>
> *Rashed Alwarrag *
>



-- 
-george william herbert
george.herbert@gmail.com

home help back first fref pref prev next nref lref last post