-
Two vulnerabilities have been discovered in Cisco SN 5420 Storage Router software releases up to and including 1.1(3). One of the vulnerabilities can cause a Denial-of-Service attack. The other allows unrestricted low level access to the SN 5420.
There is no workaround for these vulnerabilities. It is possible to mitigate them by blocking access to ports 513 and 8023 on the network edge.
The vulnerabilities are documented in Cisco Bug IDs CSCdu27529 and CSCdu27514.
No other Cisco product is affected by these vulnerabilities.
This advisory is available at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20010711-sn-kernel.
-
This section provides details on affected products.
Vulnerable Products
Cisco SN 5420 Storage Routers running software release up to and including 1.1(3) are affected by the vulnerabilities.
To determine your software release, type show system at the command prompt.
Products Confirmed Not Vulnerable
No other Cisco products are currently known to be affected by these vulnerabilities.
-
This section provides details about these vulnerabilities.
CSCdu27529
You can reboot the device by rapidly establishing multiple connections to TCP port 8023.
CSCdu27514
When logging into SN 5420 using "rlogin" or when connecting to the port 8023 from the GigabitEthernet or management interface, a user can access a developer's shell of the SN 5420. The user is not asked for a password. No other authorization is performed. This shell is used for testing during development.
Starting with software release 1.1(4), this capability is removed from the software.
-
There is no workaround for these vulnerabilities. It is possible to mitigate them by blocking access to ports 513 and 8023 on the network edge.
-
The vulnerabilities are fixed in release 1.1(4) of the software, which is available on CCO.
-
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities described in this advisory.
These vulnerabilities were found internally during product installation.
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
-
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.