Pair of Cisco Apps Are Open to Attack

 
 
By Dennis Fisher  |  Posted 2004-04-08 Print this article Print
 
 
 
 
 
 
 

UPDATED: Cisco warns customers that the software application that manages its wireless LAN products and another one used to monitor services in data centers contain unchangeable default passwords, opening them u

Cisco Systems Inc. on Wednesday warned customers that the software application that manages its wireless LAN products and another one used to monitor services in data centers contain unchangeable default passwords, opening them up to compromise by attackers. The company said both its Wireless LAN Solution Engine and its Hosting Solutions Engine ship with default username and password pairs that are hard-coded into the software and cannot be changed by users. This means that any user who can log into one of the applications will have complete control over whatever devices the application manages. It also opens up other attack scenarios. For example, an attacker could log into the WLSE and change access rights and permissions for users or set up his own access point on the network and hide it, giving him the ability to listen in on the networks traffic.
Customers use the WLSE to manage all of the devices in Ciscos wireless LAN product line, including access points and stations. The HSE is designed to help monitor services in data centers. Versions 2.0, 2.0.2 and 2.5 of the WLSE are vulnerable, and HSE 1.7, 1.7.1, 1.7.2 and 1.7.3 are affected as well.
Cisco officials said the problem was the result of someone forgetting to change the default username and password, which are used during development, before the products shipped to customers. They noted, however, that the company has not had any reports of customers being attacked as a result of this vulnerability. A company official could not say why each of the vulnerable products went through several releases before the problem was discovered. Cisco, based in San Jose, Calif., released patches that fix this vulnerability. There is no workaround for this issue. Editors Note: This story was updated to include further information from the company. Check out eWEEK.coms Security Center at http://security.eweek.com for security news, views and analysis. Be sure to add our eWEEK.com security news feed to your RSS newsreader or My Yahoo page:  
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel