Contents
Overview
Security Vulnerabilities
IPMI Usernames and Passwords
Tech Support Collection
Improvements
One IPMI Password Gives Access to All Servers in IPMI-Managed Group
Root Access on an IPMI-Managed Device Grants Complete Control
Remote Serial Console Access
User Privileges
Root Access and Hardware
BMCs Often Run Excess and Older Network Services That May Be Vulnerable
Improvements
IPMI Access May Grant Remote Console Access to the System, Resulting in Access to the BIOS
Few Monitoring Tools Are Available to Detect if the BMC is Compromised
Unclear Documentation on How to Sanitize IPMI Passwords Without Destroying the Motherboard
Certain Types of Traffic To and From the BMC Are Not Encrypted
Cipher Suite 0
Cipher Suites 114
Default Settings
IPMI Configuration
Improvements
Reset to Factory Defaults
Glossary
References
In July 2013, the U.S. government and several independent researchers have described several security vulnerabilities in the Intelligent Platform Management Interface (IPMI) specification. The Cisco IPMI implementation diverges from this public specification in some areas. This document addresses the security concerns described by the U.S. government and other independent researchers for both Cisco UCS B-Series Blade Servers and the Cisco UCS C-Series Rack Servers.
The United States Computer Emergency Readiness Team (US-CERT) issued an alert (TA13-207A) on July 26, 2013, warning of the risk of IPMI. The alert summarizes several IPMI security vulnerabilities and offers possible solutions. This section addresses the various risks outlined in the alert and offers solutions, if necessary, to avoid, minimize, or eliminate the risks.
The Cisco UCS C-Series servers have two modes of operation: Unified Computing System Manager (UCSM) mode and standalone mode. Please consult the Cisco UCS C-Series documentation for details on each mode. Unless stated otherwise, comments or data referring to Cisco UCS C-Series applies to both modes.
In various companies, often a single username and password authenticate against numerous services and applications. Thus, IPMI usernames and passwords are often the same usernames and passwords used to log into other services at the same company. The alert and various researchers claim that servers containing a baseboard management controller (BMC) often store the username and password databases locally on the non-volatile memory of the BMC. Furthermore, these databases are often stored unencrypted. If attackers had physical access, or gained access to the BMC's username and password, they would also gain access to numerous services as those users.
In the Cisco UCS B-Series Blade Server, a copy of the IPMI database is stored locally and unencrypted, and is sent down by UCSM where it is securely stored. However, that data is volatile on the Cisco Integrated Management Controller (IMC). If the blade server is removed from the chassis or the power is lost to the entire server, this database is lost as well. Thus, if the user returns the server to Cisco for any reason, that data would be lost. The original username and password database is stored at the Fabric Interconnect (FI) level in non-volatile memory. The FI storage method depends on the configuration of UCSM. The username and password data is either encrypted in the FI database using either a symmetric key algorithm or the standard Linux /etc/shadow methodology.
In the Cisco UCS C-Series, the usernames and passwords are stored in non-volatile memory but the password is encrypted using a symmetric key algorithm. Finally, in standalone Cisco UCS C-Series server, the default administrator username and password should be changed.
In Cisco UCS C-Series servers only, the collection of tech support also gathers the username and database information. Although this database is encrypted, the customer may still not like this information leaving the Cisco IMC.
In UCSM, tech support collection also grabs the username and password information but the passwords are sanitized. The username appears in a text file. It does not gather the FI database. The following options are currently available for such a circumstance (not in any particular order):
Modifying the Tech Support File
To remove the username and password information in the tech support file, complete the following steps according to the operating system. These steps assume tech support has already been collected. Please see the appropriate server user guide for details on tech support collection.
Cisco UCS C-Series Cisco IMC Tech Support: Linux-Based Operating System
In a Linux shell, complete the following steps:
Cisco UCS C-Series Cisco IMC Tech Support: Windows-Based Operating System
Several third-party tools can interpret a TAR file (for example, WinRAR and 7-Zip); however, the use of these tools is outside the scope of this document.
UCSM Tech Support: Linux-Based Operating System
In a Linux shell, complete the following steps:
UCSM Tech Support: Windows-Based Operating System
As aforementioned, several third-party tools can interpret a TAR file; however, the use of these tools is outside the scope of this document.
Cisco continually strives to improve its products and security. Cisco bug ID CSCuj13125 has been filed against the Cisco UCS C-Series server and Cisco bug ID CSCuj23543 against UCSM for gathering such information. Cisco bug ID CSCuj13203 has been filed against the Cisco UCS B-Series server to enhance the protection of usernames and passwords stored on the Cisco IMC.
Many companies' infrastructures allow a user to access various services with a single username and password. The "IPMI Usernames and Passwords" section highlights that vulnerability. That vulnerability, however, is not IPMI specific and can be applied to many companies' use of a single password for a user to access multiple services.
Best practices advise that usernames and passwords used for management purposes should be different from those used for daily activities. Passwords should be sufficiently long and complex. A best practice for IPMI would be to use 20 characters, which is the maximum allowed.
Using the same concept, for a standalone Cisco UCS C-Series server, a different password can be assigned to each server for a given user. For UCSM C-Series or B-Series, depending on the configuration of UCSM, each UCS system can be given different passwords for each system.
An alternative is to expire a user password more frequently. There are many solutions; however, because this issue is not IPMI specific and not an IPMI-only issue, the solution is outside the scope of this document.
Root access on any system gives full and unlimited control to the system's software and hardware. Root-level access has been an industry standard in many software applications such as Linux-based operating systems. The issue here specifically relates to IPMI-managed devices. Although IPMI has been around for a while, the goal of IPMI as intended was to manage both the physical and software aspect of the server, remotely and locally. The physical aspect requires certain control of the hardware to perform tasks such as environmental monitoring. The software aspect provides control often between the BIOS and the operating system such as a watchdog timer to detect a hang on the host side and to respond as specified by user action. Thus, IPMI requires software and hardware control.
This section discusses IPMI privilege levels and certain IPMI important remote management features.
The advent of remote management, like IPMI, begins to close the gap between host-side operations and server-management operations. Consequently, this could blur the line for security, or present security vulnerabilities where none existed before. In general, the solution is often to enable existing security features.
One such feature of remote management in IPMI is Serial over LAN (SOL) where access to the server's physical serial port is routed over the network to ease customer's IT management of the server. IPMI administrative-level access will have access to this serial port. Depending on which operating system is installed on the host side and the configuration of that operating system, this may imply that the user may also have unintentional root access to the host operating system. Newer versions of operating systems often have a login prompt and timeouts if the previous session did not log out. Please consult the operating system user manual for more details on serial console or serial console redirection.
SOL also plays a role during BIOS POST. In Cisco UCS B-Series and C-Series servers, BIOS must first be configured for serial console redirection on COM1 for SOL to have an effect. In Cisco UCS B-Series and UCSM mode C-Series, the control for enabling or disabling serial console redirection is handled in UCSM. In standalone C-Series, the control is available via the command-line interface (CLI) or web-based GUI. In all servers, BIOS setup can be protected by adding a BIOS password to gain BIOS control as additional security.
In Cisco UCS B-Series servers, IPMI does not offer SOL. The SOL functionality is provided via Secure Shell (SSH).
Although SOL offers ease of management, the customer can close this unexpected security vulnerability by enabling or disabling aforementioned security features.
Root-level access in IPMI is analogous to administrative level. In IPMI, there are many user privileges ranging from the lowest level that can only issue commands that retrieve information from the system, to the highest level, administrative, that can perform such tasks as powering off the host.
In both Cisco UCS B-Series and C-Series servers, the user privileges are divided into only two domains: IPMI read-write users and IPMI read-only users. IPMI read-write users are fully privileged like a root user and read-only users are the lowest level, which can only issue retrieval-based commands. In Standalone C-Series, there are three user privileges: admin, user, and read-only. Admin is the equivalent of IPMI administrator. User is the equivalent of IPMI operator and a read-only user is the lowest IPMI privilege level.
In Cisco UCS B-Series and UCSM mode C-Series, the controls of privilege assignment to a particular user are controlled via UCSM. In standalone C-Series, the control is in the C-Series CLI or web-based GUI.
For additional information, see the following:
As stated, root-level access in IPMI grants access to the server's hardware. Although hardware control is required to perform the majority of IPMI functionality, this does not mean all hardware on the platform has the potential to be compromised. The following is the list of hardware that can be controlled via the Cisco IPMI.
Cisco UCS B-Series Servers
The following Cisco UCS B-Series hardware components can be controlled:
Cisco UCS C-Series Servers
The following Cisco UCS C-Series hardware components can be controlled:
The Cisco IMC, which is a baseboard management controller (BMC), does indeed offer various network services. These services are virtual media, KVM, SOL, IPMI, SSH, SNMP and web-based GUI. SSH and web-based GUI are features only on the Cisco UCS C-Series server.
All the services listed offer authentication, integrity, and confidentiality. In addition, IPMI as a network service can be turned off. In Cisco UCS B-Series and UCSM mode C-Series, SOL and IPMI can be disabled or enabled at the UCSM level on a service profile basis. In standalone Cisco UCS C-Series, IPMI can be disabled.
In Cisco UCS B-Series or UCSM mode C-Series servers, the configuration of the network services resides at the UCSM level. Although the servers may have it locally enabled, the FI level prevents all unnecessary network traffic from reaching the Cisco IMC if the service is disabled in the FI.
The following table summarizes the service information:
Service | Default Port | Standalone C-Series Default Mode | B-Series/UCSM Mode C-Series Default Mode | Configurable |
---|---|---|---|---|
KVM | 2068 | Enabled | Enabled | C-Series Only |
vMedia | 2068 | Enabled | Enabled | C-Series Only |
NTP | 123 | Enabled | Disabled | Mode-Only |
HTTP | 80 | Enabled | Enabled | Yes |
HTTPS < | 443 | Enabled | Enabled | Yes |
SSH | 22 | Enabled | Enabled | C-Series Only |
XMLAPI < | 443 | Enabled | Disabled | Mode-Only |
IPMI over LAN | 623 | Enabled | Disabled | Mode-Only |
SNMP | 161 | Disabled | Disabled | Mode-Only |
Telnet | 23 | N/A | Disabled | Mode-Only |
SMASH CLP | - | N/A | Enabled | No |
SOL | 22 | See SSH and IPMI over LAN | Disabled | Mode-Only |
For configuration information on standalone Cisco UCS C-Series, see the following:
For configuration information on Cisco UCS B-Series or UCSM C-Series severs, see the following:
Improvements
For IPMI over LAN in Cisco UCS C-Series server, Cisco bug ID CSCuh85575 was filed to change the default setting to disabled. Cisco bug ID CSCuj51374 will drive additional coherency between the FI and Cisco B-Series servers in terms of IPMI enablement. Cisco bug ID CSCuj51380 is the C-Series equivalent of CSCuj51374.
Cisco remote console access is the same as SOL. See the "Remote Serial Console Access" section for more details.
This is a general statement as there are few monitoring tools to detect if any software or hardware is compromised. In Cisco UCS B-Series and UCSM mode C-Series, UCSM offers logging and auditing for security-related issues. For standalone mode C-Series, the Cisco IMC provides logging and auditing. In Cisco UCS B-Series and C-Series servers, the Cisco IMC has numerous security features to enhance the overall security of the server.
In Cisco UCS B-Series servers, the username and password database is stored in volatile memory. Thus, to sanitize the IPMI passwords, the blade server need only be removed from the chassis and set aside in a secure location for a few days for the DIMM memory to lose all its charge.
In Cisco UCS C-Series Servers, the username and password database is stored in non-volatile memory; therefore, the only way to sanitize these passwords is to destroy the motherboard.
To further improve Cisco UCS products, Cisco bug ID CSCuj23654 was created to allow sanitization of Cisco IMC non-volatile storage.
IPMI 2.0 offers encryption and the Cisco UCS B-Series and C-Series IPMI is based on this version. In IPMI 2.0, the authentication, confidentiality, and integrity mechanisms are done through cipher suites, specifically suites 114. These cipher suites use the RMCP+ Authenticated Key-Exchange Protocol (RAKP) as described in IPMI 2.0 public specification as the basis of authentication. This section discusses cipher suites 014 and how to configure the server for encryption.
Cipher Suite 0
Cipher suite 0 is the most unsecure of the cipher suites because it lacks authentication, confidentiality, and integrity. Cipher Suite 0 should be disabled. Please see the "Cipher Suite 114" section for details of the other cipher suites. See the "IPMI Configuration" section for information on IPMI server configuration. To disable cipher suite 0, perform steps 5 and 7 in the "Configuring IPMI through the Host Operating System" or "Configuring IPMI over the Network" sections.
Cipher Suites 114
Each cipher suite in this range offers some combination of authentication, confidentiality, and integrity algorithms. All cipher suites are based on RAKP, which works on a foundation of symmetric keys. This implies that both the client and server side must know the symmetric key prior to session establishment.
According to Table 2219 of the IPMI specification, cipher suites 1 and 6 use only authentication. Cipher Suite 2, 7, and 11 use authentication and integrity algorithms. The remaining Cipher Suites 35, 810, and 1214 use all three algorithms. This means the most secure of the cipher suites are those that use all three algorithms.
Default Settings
Cisco UCS B-Series and C-Series servers come with IPMI enabled at the Cisco IMC level with cipher suite 0 enabled. In a UCS environment, Cisco UCS B-Series and UCSM mode C-Series server, the IPMI settings at the UCSM level override the Cisco IMC-level settings. At the UCSM level, the default is disabled. In standalone mode C-Series server, IPMI is enabled by default.
Cisco does not ship servers with embedded default keys because they would present the same issues for security and deployment. Thus, the customer is expected to configure the server to their security requirements.
Cisco bug ID CSCuj23676 warns customers about a possible IPMI configuration that may lead to security vulnerabilities.
IPMI Configuration
Cipher suite 0 was not intended to be a secure protocol. Although IPMI does not clearly explain the configuration process of the cipher suites, it does specify the commands used in this process. This section describes two methods for configuring Cisco UCS B-Series and C-Series servers: configuring IPMI over the network and configuring IPMI through the host operating system.
First, read the steps in each method before deciding which configuration method to use. Then, read the "Security Configuration Notes" section that follows for additional security information before implementing the steps.
Configuring IPMI through the Host Operating System
This is the most secure method because the installation of the symmetric keys is not visible over the network as long as the method used to connect to the host operating system is deemed secured by the customer's security requirements. After connecting to the host operating system, a third-party tool is needed. For Linux-based operating systems, OpenIPMI and IPMITool are needed. The KCS driver is needed and is typically provided by OpenIPMI. Check the operating system repository to see if there is an existing package for the installed operating system variant. For Windows, the utility is ipmiutil and the IPMI drivers are needed. In either Linux or Windows, the drivers should be using KCS to communicate to the Cisco IMC.
The exact command line parameters are outside the scope of this document. Please consult the documentation for the tool. When selecting the interface to communicate to the Cisco IMC, specify KCS as the interface.
The examples below use ipmitool on a CentOS server with OpenIPMI installed. The examples assume the user has been given the appropriate privileges to execute the commands as well as set up IPMI for communication.
The following steps outline IPMI over LAN configuration:
Example of non-existent channel:
[user@localhost ~]# ipmitool -I open raw 6 0x42 0x0
Unable to send RAW command (channel=0x0 netfn=0x6 lun=0x0 cmd=0x42 rsp=0xcc): Invalid data field in request
Example of LAN channel:
[user@localhost ~]# ipmitool -I open raw 6 0x42 0x1
01 04 01 80 f2 1b 00 00 00
Note: The first byte displayed is actually the second byte with respects to the IPMI specification. A completion code of 0 for success is hidden. Thus, according to bytes 2 and 3, channel 1 is the LAN channel on this server.
Example of setting the KR key:
[user@localhost ~]# ipmitool -I open raw 6 0x56 1 0x1 0x0 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xA 0xB 0xC 0xD 0xE 0xF 0x10 0x11 0x12 0x13 0x14;
02
Note: A lock status value of 0x2 means the key is not locked.
Example of setting the KG key:
[user@localhost ~]# ipmitool -I open raw 6 0x56 1 0x1 0x1 0x11 0x21 0x31 0x41 0x51 0x61 0x71 0x81 0x91 0xA1 0xB1 0xC1 0xD1 0xE1 0xF1 0xF0 0xF1 0xF2 0xF3 0xF4;
00
Note: A lock status value of 0 means the key is not lockable.
Example of successfully retrieving the Device ID using cipher suite ID 3:
[myself@my-company-laptop ~]# ipmitool -I lanplus -C 3 -H $cimc-ip-address -U $username -P password -y 112131415161718191A1B1C1D1E1F1F0F1F2F3F4 raw 6 1
20 80 02 01 02 3f 8b 16 00 0d 00 00 01 f0 e1
Example of failure to retrieving the Device ID using cipher suite ID 3:
[myself@my-company-laptop ~]# ipmitool -I lanplus -C 3 -H $cimc-ip-address -U $username -P $password -y 112131415161718191A1B1C1D1E1F1F0F1F2F3F5 raw 6 1
Error: Unable to establish IPMI v2 / RMCP+ session
Unable to send RAW command (channel=0x0 netfn=0x6 lun=0x0 cmd=0x1)
Example of Disabling Cipher Suite 0:
[user@localhost ~]# ipmitool -I open raw 0xC 0x1 1 0x18 0 0x40 0x44 0x44 0x44 0x44 0x44 0x44 0x4
Note: If successful, there is no message or text given back by ipmitool.
Example of Disabling all IPMI version 1.5:
[user@localhost ~]# ipmitool -I open raw 0xC 0x1 1 0x2 0 0 0 0 0
Note: If successful, there is no message or text given back by ipmitool.
Example of Cipher Suite 0 Successfully Disabled:
[user@localhost ~]# ipmitool -I lanplus -C 0 -H 10.193.71.52 -U scott -P scott raw 6 1
Error in open session response message: no matching cipher suite
Error: Unable to establish IPMI v2 / RMCP+ session
Unable to send RAW command (channel=0x0 netfn=0x6 lun=0x0 cmd=0x1)
Example of Disabiling Administrator Access over IPMI version 1.5 using No Authentication:
[user@localhost ~]# ipmitool -I lan -H $(CIMC-IP-Adress) -U $username -P $password raw 6 1
Authentication type NONE not supported
Authentication type NONE not supported
Error: Unable to establish LAN session
Unable to send RAW command (channel=0x0 netfn=0x6 lun=0x0 cmd=0x1)
Example of locking the KR Key:
[user@localhost ~]# ipmitool -I open raw 6 0x56 1 2 0
01
Note: The lock status, 0x1, indicates the key is locked.
Configuring IPMI over the Network
This option is the most convenient and eases deployment, but it is also the most insecure because the delivery of the keys will not be encrypted over the network. The steps at a high level are similar to the previous section. This section assumes UCSM and the server's server profiles are correctly configured for Cisco UCS B-Series, UCSM mode C-Series, and standalone C-Series servers, and the Cisco IMC CLI or web GUI has IPMI correctly enabled.
If during this process, the user accidentally cuts off the network connection, please follow the same process described in the "Configuring IPMI through the Host Operating System" section to recover and configure the server.
Example of LAN channel:
[user@localhost ~]# ipmitool -I lanplus -C 0 -H $CIMC-IP-Address -U $username -P $password raw 6 0x42 0xE
01 04 01 80 f2 1b 00 00 00
Note: The first byte displayed is actually the second byte with respects to the IPMI specification. A completion code of 0 for success is hidden. Thus, according to bytes 2 and 3, channel 1 is the LAN channel on this server. The value of 0xE in the request byte is a special byte indicating the channel of the request.
Example of setting the KR key:
[user@localhost ~]# ipmitool -I lanplus -C 0 -H $CIMC-IP-Address -U $username -P $password raw 6 0x56 1 0x1 0x0 0x1 0x2 0x3 0x4 0x5 0x6 0x7 0x8 0x9 0xA 0xB 0xC 0xD 0xE 0xF 0x10 0x11 0x12 0x13 0x14;
02
Note: A lock status value of 0x2 means the key is not locked.
Example of setting the KG key:
[user@localhost ~]# ipmitool -I lanplus -C 0 -H $CIMC-IP-Address -U $username -P $password raw 6 0x56 1 0x1 0x1 0x11 0x21 0x31 0x41 0x51 0x61 0x71 0x81 0x91 0xA1 0xB1 0xC1 0xD1 0xE1 0xF1 0xF0 0xF1 0xF2 0xF3 0xF4;
00
Note: A lock status value of 0 means the key is not lockable.
Example of successfully retrieving the Device ID using cipher suite ID 3:
[user@localhost ~]# ipmitool -I lanplus -C 3 -H $cimc-ip-address -U $username -P password -y 112131415161718191A1B1C1D1E1F1F0F1F2F3F4 raw 6 1
 20 80 02 01 02 3f 8b 16 00 0d 00 00 01 f0 e1
Example of failure to retrieving the Device ID using cipher suite ID 3:
[user@localhost ~]# ipmitool -I lanplus -C 3 -H $cimc-ip-address -U $username -P $password -y 112131415161718191A1B1C1D1E1F1F0F1F2F3F5 raw 6 1
Error: Unable to establish IPMI v2 / RMCP+ session
Unable to send RAW command (channel=0x0 netfn=0x6 lun=0x0 cmd=0x1)
Example of Disabling Cipher Suite 0:
[user@localhost ~]# ipmitool -I lanplus -C 0 -H $CIMC-IP-Address -U $username -P $password raw 0xC 0x1 1 0x18 0 0x40 0x44 0x44 0x44 0x44 0x44 0x44 0x4
Note: If successful, there is no message or text given back by ipmitool.
Example of Disabling all IPMI version 1.5:
[user@localhost ~]# ipmitool -I open -C 3 -H $CIMC-IP-Address -U $username -P $password -y $KG-Key raw 0xC 0x1 1 0x2 0 0 0 0 0
Note: If successful, there is no message or text given back by ipmitool. Also, another cipher suite is used with the appropriate key specified.
Example of Cipher Suite 0 Successfully Disabled:
[user@localhost ~]# ipmitool -I lanplus -C 3 -H $CIMC-IP-Address -U $username -P $password -y $KG-Key raw 6 1
Error in open session response message: no matching cipher suite
Error: Unable to establish IPMI v2 / RMCP+ session
Unable to send RAW command (channel=0x0 netfn=0x6 lun=0x0 cmd=0x1)
Example of Disabiling Administrator Access over IPMI version 1.5 using No Authentication:
[user@localhost ~]# ipmitool -I lan -H $CIMC-IP-Address -U $username -P $password raw 6 1
Authentication type NONE not supported
Authentication type NONE not supported
Error: Unable to establish LAN session
Example of locking the KR Key:
[user@localhost ~]# ipmitool -I lanplus -C 3 -H $CIMC-IP-Address -U $username
-P $password -y $KG-Key raw 6 0x56 1 2 0
01
Note: The lock status, 0x1, indicates the key is locked.
Security Configuration Notes
The user must be aware that IPMI commands can be sent from the host to the Cisco IMC on the same server using a hardware path called KCS. IPMI assumes accesses to IPMI across any physical interfaces on the server is considered authenticated by the host operating system and therefore grants unlimited access. If the host operating system user is given access to IPMI, that user can potentially undo or compromise the existing IPMI configuration.
Improvements
Cisco recorded Cisco bug ID CSCuj23684 to ease deployment of Cisco UCS B-Series and UCSM mode C-Series servers. Cisco bug ID CSCuj23691 was recorded for standalone C-Series servers to warn about improper IPMI configuration and provide easy deployment of servers. Cisco bug ID CSCuh85553 will track the disabling of cipher suites 0, 1, 2, 6, 7, and 11 and all of IPMI version 1.5 LAN connection methods as the default shipping configuration for Cisco UCS B-Series servers. Cisco bug ID CSCuh85575 will track the disabling of cipher suites 0, 1, 2, 6, 7, and 11 and all of IPMI version 1.5 LAN connection methods as the default shipping configuration for C-Series servers.
Reset to Factory Defaults
If at any time, the user wishes to restore IPMI settings to factory default, UCSM and standalone C-Series servers provide a CLI command to perform the action. This will remove any installed cipher suite security keys.
To reset C-Series servers to factory default settings using CLI and GUI, see the following:
To reset UCS servers to factory default settings, perform the following steps:
Term | Definition |
---|---|
Cisco IMC | Cisco Integrated Managment Controller. This micro controller physically resides on the server and is responsible for numerous management activities from environmental monitoring to remote management. |
BMC | Baseboard Management Controller. This is the same as the Cisco IMC. |
FI | Fabric Interconnect |
UCSM | Unified Computing Server Management |
IPMI | Intelligent Platform Management Interface |
IPMI specifications
http://www.intel.com/content/www/us/en/servers/ipmi/ipmi-specifications.html
US-Cert
http://www.us-cert.gov/ncas/alerts/TA13-207A
This document is part of the Cisco Security portal. Cisco provides the official information contained on the Cisco Security portal in English only.
This document is provided on an “as is” basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information in the document or materials linked from the document is at your own risk. Cisco reserves the right to change or update this document without notice at any time.