search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Cisco SN 5420 Storage Router fails to properly authenticate user before granting read access to configuration file

Vulnerability Note VU#833459

Original Release Date: 2002-01-14 | Last Revised: 2002-01-14

Overview

It is possible to read the stored configuration file from the Cisco SN 5420 Storage Router without any authorization. This can lead to an intruder gaining access to the storage space on the router.

Description

A vulnerability has been discovered in the Cisco SN 5420 Storage Router software versions 1.1(5) and earlier. An intruder can read the configuration file of the router without authorization. This can lead to access of the storage space. Cisco has released an advisory to address this issue, it is available at http://www.cisco.com/warp/public/707/SN-multiple-pub.shtml.

Impact

An intruder can gain unauthorized access to the storage space after reading the configuration file of the storage router.

Solution

This vulnerability is fixed in release 1.1(7) of the software. Please see Cisco's advisory for instructions on how to obtain the updated software for free. Cisco notes that version 1.1(6) of the software was never released.

You can limit your exposure to this vulnerability by using a firewall to restrict access to your network. Note that this does not protect you against attackers from within your network.

Vendor Information

833459
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Our thanks to Cisco for the information provided in their advisory.

This document was written by Jason Rafail.

Other Information

CVE IDs: None
Severity Metric: 15.54
Date Public: 2002-01-09
Date First Published: 2002-01-14
Date Last Updated: 2002-01-14 15:37 UTC
Document Revision: 16

Sponsored by CISA.