The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Cisco NAC Appliance Agent Installation Bypass Vulnerability


<< Previous INDEX Search src / Print Next >>
Date: Fri, 25 Aug 2006 17:23:28 -0700 (PDT)
From: Andreas Gal <gal@uci.edu.>
To: [email protected]
Subject: Cisco NAC Appliance Agent Installation Bypass Vulnerability
Message-ID: <Pine.LNX.4.62.0608251720180.9882@sam.ics.uci.edu.>
X-GPG-FINGRPRINT: 9C09 A88B F2AC FEEA 778E  34A3 32BB 38E6 EED9 166B
X-GPG-PUBLIC_KEY: http://nil.ics.uci.edu/~gal/gal-pubkey.asc
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed
X-Virus-Scanned: antivirus-gw at tyumen.ru

Description:
Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed 
Network Admission Control (NAC) product that uses the network 
infrastructure to enforce security policy compliance on all devices 
seeking to access network computing resources. With NAC Appliance, network 
administrators can authenticate, authorize, evaluate, and remediate wired, 
wireless, and remote users and their machines prior to network access. It 
identifies whether networked devices such as laptops, IP phones, or game 
consoles are compliant with your network's security policies and repairs 
any vulnerabilities before permitting access to the network.

Vendor site:
http://www.cisco.com/en/US/products/ps6128/

Affected versions:
All current (<= 3.6.4.1 at the time of the release)

Discovery 
Date: 2006-08-15

Report Date:
2006-08-20 (vendor), 2006-08-25 (public)

Severity:
Medium

Remote:
Yes

Related previous reports:
http://www.securityfocus.com/archive/1/408603/30/0/threaded

Discovered by:
Andreas Gal (http://www.andreasgal.com/)
Joachim Feise (http://www.feise.com/)

Vulnerability:
Previous versions of the software allowed users to bypass the "mandatory" 
installation of the Clean Access Agent by changing the browser user-agent 
string. With version 3.6.0, Cisco added additional detection mechanisms 
such as TCP fingerprinting and JavaScript OS detection. By changing the 
default parameters of the Windows TCP/IP stack and using a custom HTTPS 
client (instead of a browser) the user can still connect to the network 
without running any host-based checks. Authentication and remote checks 
are not affected.

Proof-of-concept implementation:
http://kevin.sf.net/howto.html
http://kevin.sf.net/download/kevin.exe
http://kevin.sf.net/download/kevin.conf
http://kevin.cvs.sourceforge.net/kevin/

Acknowledgements:
The registry settings to masquerade the Windows TCP/IP stack were derived 
from sec_cloak written by Craig Heffner.


<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру