Not so long ago, the IT giant announced a critical vulnerability in the ASR 9000 system. Under the cut, we tell you what the bug is and how to patch it.
Photo - ulleo - PDVulnerability found in the ASR 9000 series routers running 64-bit IOS XR. This is a high-end class equipment for data centers of telecommunications companies and mobile operators, which
has a capacity of 400 Gbit / s per slot and supports 40G / 80G line cards.
')
Vulnerabilities assigned ID CVE-2019-1710 . She scored 9.8 points out of 10 on the CVSS scale.
This standard was developed by a group of information security specialists from companies such as Microsoft, Cisco, CERT, IBM to assess the danger of bugs.
Why is she dangerous
The bug gives attackers the opportunity to gain unauthorized access to system applications on the admin virtual machine. Hackers can remotely execute malicious code and conduct DoS attacks. According
to Cisco engineers, the problem is the inappropriate isolation of the secondary management interface (MGT LAN 1 on the route switch processor - RSP) from the internal administrator applications. An attacker can exploit a vulnerability by connecting to one of them.
To determine if there is a problem on your system, you need to log in to the sysadmin virtual machine and enter the show interface command in the console. If the secondary interface is connected (as in the answer below), then the router is vulnerable.
sysadmin-vm:0_RSP1:eXR
Cisco specialists say that only the ASR 9000 platform is vulnerable. Other solutions of the company running Cisco IOS-XR 64 bit are stable. In this case, the company has not yet recorded attempts to conduct a hacker attack using CVE-2019-1710.
How to close it
Cisco experts have published a patch that fixes CVE-2019-1710 as part of IOS XR versions 6.5.3 and 7.0.1. The update is available free of charge for all organizations with the current license for the operating system (and those who bought it earlier).
There is also an alternative option - you can resort to a workaround, which completely eliminates the vulnerability. First you need to connect to the admin virtual machine:
RP/0/RSP1/CPU0:eXR
Then run Bash and edit the calvados_bootstrap.cfg configuration file:
sysadmin-vm:0_RSP1:eXR
The next two lines need to remove the # sign and save the file.
If the solution has two RSP systems, then you need to remove # in the configuration of each of them. Then, just restart the virtual machine:
sysadmin-vm:0_RSP1:eXR
She will have to return the following message:
RP/0/RSP1/CPU0:eXR
What else patch
In parallel with the patch for CVE-2019-1710, the IT giant released twenty more “patches” for less critical vulnerabilities. There are six bugs in the IAPP (Inter-Access Point Protocol) protocol, as well as in the WLC interface (Wireless LAN Controller) and Cisco VCS Expressway.
The list of products with patches includes: UCS B-Series Blade Servers, Cisco Umbrella, DNA Center, Registered Envelope Service, Directory Connector, Prime Network Registrar, etc. The full list can be found
on the official website .
Photo - Mel Clark - PDAlso in early May, the developers of the corporation have
closed another ASR 9000 and Cisco IOS XR vulnerability. It is associated with the PIM (Protocol Independent Multicast) function, which solves the problem of multicast routing. The bug (it received the identifier
CVE-2019-1712 ) allows an attacker to remotely restart the PIM process and conduct a DoS attack.
In addition, the developers have
published a series of warnings regarding previously fixed vulnerabilities. Some of them, according to information security experts, are employed by the hacker group Sea Turtle for their DNS attacks. Engineers promised to monitor the situation and publish fresh updates.
ITGLOBAL.COM - provider of private and hybrid cloud, as well as other services aimed at the development of the IT infrastructure of our customers. What we write about in the corporate blog: