Cisco Flaws Leave Firewalls, VPNs VulnerableBy Ryan Naraine | Posted 2006-08-25 Email Print
Know the Risk: Digital Transformation's Impact on Your Business-Critical Applications REGISTER >
The routing and switching giant ships patches for security holes in its appliance and virtual private network products.
Network routing and switching giant Cisco Systems has issued an alert for a potentially serious security flaw affecting multiple firewall products, warning that the bug could cause passwords to be changed without any user interaction.
The San Jose, Calif., company said unauthorized users can take advantage of the firewall bug to try to gain access to a device that has been reloaded after passwords in its startup configuration have been changed.
In addition, authorized users can be locked out and lose the ability to manage the affected device, according to the published advisory.
Affected products include Cisco PIX 500 Series Security Appliances, the Cisco ASA 5500 Series Adaptive Security Appliances and the FWSM (Firewall Services Module) for the Cisco Catalyst 6500 switches.
Cisco 7600 Series routers are impacted if they are running an affected software version, the company said.
"The software issue may cause the EXEC password, password of locally defined users, and the enable password in the startup configuration to change without user's intervention. This will prevent administrators from logging in to the device if authentication is configured to use the passwords stored in the startup configuration," Cisco warned.
Read the full story on eWEEK.com: Cisco Flaws Leave Firewalls, VPNs Vulnerable