Once again, hackers are trying to sell what they purport to be the source code for Ciscos PIX firewall. But it isnt clear that theres any threat posed to customers by the code. In fact, the only people who might benefit from the code are Ciscos competitors.
The “Source Code Club” is offering to sell the PIX code for $24,000. But its not certain that anybody buying the code would be able to use it to find holes in the firewall software any more effectively than they could without it—unless they have significant software development and computing resources to examine the 37 MB of uncompiled code.
When some of the source code to Windows was stolen off a server at Mainsoft and released into the wild, many were concerned that it would mean hackers would quickly find new vulnerabilities in Windows and create “zero-day” exploits of the operating system—holes that Microsofts customers would have no prior warning of. Those concerns turned out to be unfounded. That was at least partially because of the age of the code (it was for Windows NT 4.0) and its incomplete nature, but it was also because most of what hackers could learn from the code couldnt be exploited to circumvent security.
The firewall code stolen from Cisco is apparently more complete and more current than the exposed Windows code. But the fact is that the biggest risk that the missing software poses is to Cisco itself—and a large portion of that risk surrounds this story continuing to appear in the news.
The code theft has become an embarrassment to Cisco, undermining the companys marketing message. After all, if their own network security products couldnt stop the theft of their intellectual property, how are they going to protect their customers? And the source code would be a boon to any would-be competitors seeking to develop a firewall product of their own—especially for overseas markets like China, where intellectual property rights border on theoretical.
Given the precedent set by SCO Groups litigation, open-source developers would likely avoid the Cisco code like the plague. Its still possible that the concepts and methods used within the PIX firewall source—or even chunks of the code itself–could find their way into some open source project. But at the current asking price, its unlikely anyone is going to risk receiving stolen goods just to give it away.
Even those with malicious intent beyond stealing Ciscos ideas will have a hard time getting any value out of the source–having the source code is not necessarily going to help hackers find new vulnerabilities in the PIX software. After all, if Cisco hasnt found them with the resources it dedicates to keeping the code bug free, it would take a good deal of deliberation over the code for someone else to find them.
The worst-case secenario is that some evil-doer could use the source code to create an image of the PIX software that provides a back-door for him or others to magically circumvent the firewall. But for that scenario to work, the bad guys would have to convince their target to install that software image onto a firewall. And targets worth attempting an attack of that kind of sophistication on, requiring such a high level of both “social engineering” and significant resources to back it, arent very numerous.
Alternatively, someone with deep programming knowledge could identify ways to attack existing routers by creating buffer overflows in the software with external input—for a denial-of-service attack. Or they could find a way to pull off some sort of “man in the middle” attack against a VPN session based on gaps in how PIX handles session authentication.
In fact, these are both vulnerabilities that Cisco has found in the past in the PIX software—two years ago, in earlier versions of the software. Odds are that Cisco has filled in most of these holes—at least the ones that are obvious from just looking at the source code.
But if hackers wanted to spend $24,000 to figure out how to take out a PIX firewall, theyd probably be better off spending it on a Cisco PIX firewall of their own, or maybe some Cisco network engineer training. Thats because most of the vulnerabilities in firewalls are the result of misconfiguration—and the best way to learn about those vulnerabilities is by learning how to run a firewall correctly.
Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.