Nasty Security Flaw Found In Cisco's Wireless LAN Products - InformationWeek
IoT
IoT
News
News
4/8/2004
02:11 PM
50%
50%
RELATED EVENTS
Moving UEBA Beyond the Ground Floor
Sep 20, 2017
This webinar will provide the details you need about UEBA so you can make the decisions on how bes ...Read More>>

Nasty Security Flaw Found In Cisco's Wireless LAN Products

The holes in Cisco's wireless LAN applications follow the publishing of a hacker toolkit that targeted Cisco customers.

Cisco Systems is warning customers that certain versions of its wireless-LAN-management software contain a security hole that would let attackers redirect users to a potentially malicious Web site or take complete control of a wireless LAN.

In a security advisory, Cisco warned that the flaws are within CiscoWorks WLSE, a management tool for the company's wireless LAN hardware and software, and the Cisco Hosting Solution Engine, which enables data-center services and monitors data-center performance. According to the advisory, the software versions at risk for WLSE include 2.0, 2.0.2, and 2.5. The Hosting Solution Engine-vulnerable software versions include 1.7, 1.7.1, 1.7.2, and 1.7.3.

The security flaw is identical for both applications: There's a default user name and password combination that has been hard-coded into the software.

"Any user who logs in using this user name has complete control of the device. One can add new users or modify details of the existing users and change the device's configuration," Cisco warns in its advisory. For WLSE, it says, such a compromise could cause, among other things, systemwide outages and the ability for attackers to hide so-called rogue, or unauthorized, wireless access points. The Hosting Solution Engine flaw could let attackers redirect Web traffic to a site of their choice.

Cisco says there's no workaround for these flaws. More details, including patches, are available here.

This is the second major security threat to Cisco customers in less than two weeks. Last week, a hacker-attack tool, dubbed "CISCO Global Exploiter," surfaced on the Internet. The hacker toolkit made it easy for attackers to exploit 10 vulnerabilities found in various Cisco products.

Last week, Network Associates Inc.'s McAfee Avert security researchers advised Cisco customers to make sure they're not vulnerable to the following security holes:

  • Cisco 677/678 Telnet Buffer Overflow Vulnerability
  • Cisco OIS Router Denial-of-Service Vulnerability
  • Cisco OIS HTTP Authentication Vulnerability
  • Cisco OIS HTTP Configuration Arbitrary Administrative Access Vulnerability
  • Cisco Catalyst SSH Protocol Mismatch Denial-of-Service Vulnerability
  • Cisco 675 Web Administration Denial-of-Service Vulnerability
  • Cisco Catalyst 3500 XL Remote Arbitrary Command Vulnerability
  • Cisco IOS Software HTTP Request Denial-of-Service Vulnerability
  • Cisco 514 UDP Flood Denial-of-Service Vulnerability
  • CiscoSecure ACS Vulnerability

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll