The vulnerability affects virtually every major firewall and intrusion prevention system available, including products from Cisco Systems. Given Ciscos major share of the market, at least for enterprise routers and VPN and firewall equipment—according to Gartner, Cisco was at the top of the heap with 66 percent of that market in 2006—that means most businesses will be affected.
The vulnerability concerns HTTP content-scanning systems that fail to properly scan full-width and half-width Unicode-encoded HTTP traffic. A remote attacker could exploit the vulnerability by sending specially crafted HTTP traffic to a vulnerable content scanning system. After sneaking malware past the firewall or IPS, the attacker can then wreak havoc on a system, scanning and attacking without being detected.
Multiple Cisco products are affected, including Ciscos IPS CSCsi58602 and its Cisco IOS with Firewall/IPS Feature Set CSCsi67763. Cisco has an advisory up. In the advisory the company states that its not aware of any exploits of the vulnerability.
While Cisco is the only vendor to have verified that its products are vulnerable, theres a long list of vendors that havent said whether their products are vulnerable or not.
Specifically, the US-CERT note lists 92 vendors whose security products may be vulnerable; of those, as of the afternoon of May 15, only two—Apple and Hewlett-Packard—had verified that their security software isnt vulnerable.
The list of other companies products whose vulnerability status is unknown ranges widely, from products by 3Com and F5 Networks to the open-source Snort and just about every other well-known security product out there.
The vulnerability has been known since at least April 16 and was made public on May 14.
Editors Note: This story was updated to include additional information about the flaws relevance to enterprise security.
Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.