search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Cisco Adaptive Security Appliance insecurely logs passwords

Vulnerability Note VU#563673

Original Release Date: 2007-09-05 | Last Revised: 2007-10-01

Overview

The Cisco Adaptive Security Appliance (ASA) firewall may log user credentials, including passwords, as plain text when AAA authentication is enabled.

Description

The Cisco Adapative Security Appliance (ASA) is a firewall with Intrusion Protection System (IPS), Stateful Packet Inspection (SPI), and routing features. The Cisco ASA includes Authentication, Authorization and Accounting (AAA) support that allows adminsitrators and users to use a single set of credentials to manage multiple devices.


When setting up or troubleshooting the ASA server's AAA authentication features, the test button can be used to confirm that the AAA service is functioning properly.

When the test button is clicked, the AAA username and password will be sent to the syslog service in plain text. If remote syslog is enabled, the credentials will be transmitted across the network in plain text, and stored on the syslog server in plain text.

In the below screenshot, the vulnerable input box has been highlighted.

Impact

Authentication credentials may be stored in plain text, possibly on remote servers. The credentials may also be sent unencrypted over the network.

Solution

See the "Sytems Affected" section of this document for more information about obtaining updates.

The following workarounds may partially mitigate this vulnerability:

    • Check log files for stored AAA credentials, and change passwords if needed.
    • Use management VLANs to seperate syslog network traffic from other devices on the network.
    • Use access controls, file permissions, and physical security to ensure that syslog files can not be read by unauthorized individuals.

Vendor Information

563673
 

CVSS Metrics

Group Score Vector
Base 0 AV:--/AC:--/Au:--/C:--/I:--/A:--
Temporal 0 E:ND/RL:ND/RC:ND
Environmental 0 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Acknowledgements

This vulnerability was reported and discovered by Lisa Sittler of CERT/CC.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: None
Severity Metric: 0.13
Date Public: 2007-09-05
Date First Published: 2007-09-05
Date Last Updated: 2007-10-01 23:05 UTC
Document Revision: 21

Sponsored by CISA.