COMMAND
Cisco Catalyst
SYSTEMS AFFECTED
All users of Cisco Catalyst 4000, 5000, 5500, 6000 and 6500 with
the software version 5.4(1) only
PROBLEM
Following is based on Cisco Security Advisory. Cisco Catalyst
software permits unauthorized access to the enable mode in the
5.4(1) release. Once initial access is granted, access can be
obtained for the higher level "enable" mode without a password.
This problem is resolved in version 5.4(2). Customers with
vulnerable releases are urged to upgrade as soon as possible.
This vulnerability has been assigned Cisco bug ID CSCdr10025.
The affected image names are as follows:
cat4000_5-4-1.bin
cat5000-supg_5-4-1.bin
cat5000-Sup_5-4-1.bin
cat5000-Sup3_5-4-1.bin
cat6000-Sup_5-4-1.bin
No other releases of Cisco Catalyst software are affected by this
vulnerability. No other Cisco products are affected by this
vulnerability.
Anyone who can obtain ordinary console access to an affected
switch can bypass password authentication to obtain "enable" mode
access without knowledge of the "enable" password. This
vulnerability can be exploited through the network using telnet
or via the physical console.
This problem was introduced in software version 5.4(1), and is
corrected in version 5.4(2). Due to this defect, software version
5.4(1) is deferred. Customers are urged to upgrade to version
5.4(2).
This vulnerability permits unauthorized access to the
configuration mode and unauthorized configuration changes on a
Catalyst switch.
SOLUTION
Cisco is offering free software upgrades to remedy this
vulnerability for all affected customers. Customers with
contracts should obtain upgraded software through their regular
update channels. For most customers, this means that upgrades
should be obtained via the Software Center on Cisco's Worldwide
Web site at http://www.cisco.com.
There are no known workarounds for this vulnerability. Strictly
limiting telnet access to the device will prevent the initial
connection required to exploit this vulnerability. Telnet access
can be controlled with the following command set:
set ip permit <address> <mask> telnet
set ip permit enable
This command set will deny all traffic not specified in the permit
statement.