search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Guidance EnCase Enterprise uses weak authentication to identify target machines

Vulnerability Note VU#912593

Original Release Date: 2007-11-09 | Last Revised: 2007-11-20

Overview

Guidance Software's EnCase Enterprise uses IP authentication to identify target machines. An attacker may be able to provide the EnCase SAFE server with a disk image from a different machine than an investigator requested.

Description

Guidance Software's EnCase Enterprise allows investigators to remotely acquire disk images from target systems for forensic analysis. The remote target systems may be on the same LAN or located on the Internet.

EnCase Enterprise consists of three applications:

    1. EnCase SAFE is a server that is used to authenticate users, distribute licenses, provide forensic analysis tools, and communicate with target machines running the EnCase Servlet.
    2. EnCase Servlet runs locally on target machines and allows the EnCase SAFE to create an image from the target operating system.
    3. EnCase Examiner is a local application that is installed on the investigator’s computer and provides an interface to the EnCase SAFE server.

    EnCase Enterprise Edition uses a public key encryption system to verify that the servlet is communicating with an authorized SAFE server; however, the SAFE server uses IP authentication to verify the identity of the servlet.

    Information about this vulnerability was publicly disclosed by the iSec paper "Breaking Forensics Software: Weaknesses in Critical Evidence Collection."

    Impact

    An attacker may be able to supply the EnCase SAFE with a different image than the investigator requested by using ARP spoofing or other well-known network attacks.

    Solution

    Guidance Encase customers should see the Guidance support portal for information about obtaining fixed software and workarounds.


    The following workarounds may mitigate this vulnerability:

      • Using IPSec or other virtual private network network technologies to provide secure communications and authentication for machines running the EnCase Servlet may mitigate this vulnerability by preventing attackers from injecting or manipulating data.
      • IDS systems capable of detecting ARP spoofing may be able to alert administrators when this attack vector is being exploited.

    Vendor Information

    912593
     

    CVSS Metrics

    Group Score Vector
    Base
    Temporal
    Environmental

    References

    Acknowledgements

    iSec partners released information about this vulnerability.

    This document was written by Ryan Giobbi and Jason McCormick.

    Other Information

    CVE IDs: CVE-2007-4202
    Severity Metric: 0.90
    Date Public: 2007-08-03
    Date First Published: 2007-11-09
    Date Last Updated: 2007-11-20 18:34 UTC
    Document Revision: 34

    Sponsored by CISA.