cisco-sa-20180418-wlc
Vulnerability from csaf_cisco
Published
2018-04-18 16:00
Modified
2018-04-23 21:00
Summary
Cisco Wireless LAN Controller Default Simple Network Management Protocol Community Strings

Notes

Summary
With new installations of Cisco Wireless LAN Controller Software, the installation scripts create default communities for Simple Network Management Protocol (SNMP) Version 2 (SNMPv2) and a default username for SNMP Version 3 (SNMPv3), both allowing for read and write access. As documented in the Cisco Wireless LAN Controller Configuration Best Practices guide ["https://www.cisco.com/c/en/us/td/docs/wireless/technology/wlc/8-5/82463-wlc-config-best-practice.html#pgfId-379998"], the SNMP configuration should either be changed or disabled depending on the environmental requirements. If the default communities and username are not changed or disabled, the system is open for read and write access through SNMP. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wlc ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wlc"]
Vulnerable Products
This issue affects all Cisco Wireless LAN Controllers. For information about affected software releases, consult the Cisco bug ID(s) at the top of this advisory.
Products Confirmed Not Vulnerable
No other Cisco products are currently known to be affected by this issue.
Workarounds
The following workarounds are available: Administrators should delete the default SNMPv3 user. Administrators should delete the default public and private community strings.
Fixed Software
Cisco has not released software updates to address the issue described in this advisory.
Recommendations
Cisco Wireless LAN Controller Best Practice: Change SNMPv3 Default User Check the SNMPv3 default user. By default, the controller is configured with a username that should be disabled or changed. The following example shows how to verify the SNMPv3 users configuration: (Cisco Controller) >show snmpv3user SNMP v3 User Name AccessMode Authentication Encryption -------------------- ----------- -------------- ---------- default Read/Write HMAC-SHA CFB-AES The following examples shows how to delete the default SNMPv3 user and create a new user: (Cisco Controller) >config snmp v3user delete default (Cisco Controller) >config snmp v3user create nondefault rw hmacsha des authkey <encrypkey12characters> Cisco Wireless LAN Controller Best Practice: Delete SNMPv2 Default Communities Check the SNMPv2 default communities. By default, the controller is configured with default community strings that should be removed. The following example shows how to verify the SNMPv2 community settings: > show snmpcommunity SNMP Community Name Client IP Address Client IP Mask Access Mode Status ---------------- ----------- -------------- ---------- public 0.0.0.0 0.0.0.0 Read Only Enable ********** 0.0.0.0 0.0.0.0 Read/Write Enable The following example shows how to delete an active SNMP Community: > config> snmp community delete private > show snmpcommunity SNMP Community Name Client IP Address Client IP Mask Access Mode Status ---------------- ----------- -------------- ---------- public 0.0.0.0 0.0.0.0 Read Only Enable The following example shows how to configure an SNMP Community: > config> snmp community create SNMP_Community >show snmpcommunity SNMP Community Name Client IP Address Client IP Mask Access Mode Status ---------------- ----------- -------------- ---------- SNMP_Community 0.0.0.0 0.0.0.0 Read Only Enable Note: Ensure that the SNMP settings match between the controller and the Wireless Control System (WCS)/Network Control System(NCS)/Prime Infrastructure (PI). In addition, use encryption and hash keys that match the security policies. The Cisco Wireless LAN Controller Configuration Best Practices guide is available at the following URL: https://www.cisco.com/c/en/us/td/docs/wireless/technology/wlc/8-5/82463-wlc-config-best-practice.html#pgfId-379998 ["https://www.cisco.com/c/en/us/td/docs/wireless/technology/wlc/8-5/82463-wlc-config-best-practice.html#pgfId-379998"]
Vulnerability Policy
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Exploitation and Public Announcements
The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the issue that is described in this advisory.
Source
Cisco would like to thank Jim Thomas, Senior Security Architect with Insight, for reporting this issue.
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.



{
  "document": {
    "acknowledgments": [
      {
        "summary": "Cisco would like to thank Jim Thomas, Senior Security Architect with Insight, for reporting this issue."
      }
    ],
    "category": "csaf_informational_advisory",
    "csaf_version": "2.0",
    "notes": [
      {
        "category": "summary",
        "text": "With new installations of Cisco Wireless LAN Controller Software, the installation scripts create default communities for Simple Network Management Protocol (SNMP) Version 2 (SNMPv2) and a default username for SNMP Version 3 (SNMPv3), both allowing for read and write access.\r\n\r\nAs documented in the Cisco Wireless LAN Controller Configuration Best Practices guide [\"https://www.cisco.com/c/en/us/td/docs/wireless/technology/wlc/8-5/82463-wlc-config-best-practice.html#pgfId-379998\"], the SNMP configuration should either be changed or disabled depending on the environmental requirements. If the default communities and username are not changed or disabled, the system is open for read and write access through SNMP.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wlc [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wlc\"]",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "This issue affects all Cisco Wireless LAN Controllers. For information about affected software releases, consult the Cisco bug ID(s) at the top of this advisory.",
        "title": "Vulnerable Products"
      },
      {
        "category": "general",
        "text": "No other Cisco products are currently known to be affected by this issue.",
        "title": "Products Confirmed Not Vulnerable"
      },
      {
        "category": "general",
        "text": "The following workarounds are available:\r\n\r\nAdministrators should delete the default SNMPv3 user.\r\n\r\n      Administrators should delete the default public and private community strings.",
        "title": "Workarounds"
      },
      {
        "category": "general",
        "text": "Cisco has not released software updates to address the issue described in this advisory.",
        "title": "Fixed Software"
      },
      {
        "category": "general",
        "text": "Cisco Wireless LAN Controller Best Practice: Change SNMPv3 Default User\r\nCheck the SNMPv3 default user. By default, the controller is configured with a username that should be disabled or changed.\r\n\r\nThe following example shows how to verify the SNMPv3 users configuration:\r\n\r\n\r\n(Cisco Controller) \u003eshow snmpv3user\r\nSNMP v3 User Name AccessMode Authentication Encryption\r\n-------------------- ----------- -------------- ----------\r\ndefault Read/Write HMAC-SHA CFB-AES\r\nThe following examples shows how to delete the default SNMPv3 user and create a new user:\r\n(Cisco Controller) \u003econfig snmp v3user delete default\r\n(Cisco Controller) \u003econfig snmp v3user create nondefault rw hmacsha des authkey\r\n\u003cencrypkey12characters\u003e\r\n\r\n\r\n    Cisco Wireless LAN Controller Best Practice: Delete SNMPv2 Default Communities\r\nCheck the SNMPv2 default communities. By default, the controller is configured with default community strings that should be removed.\r\n\r\nThe following example shows how to verify the SNMPv2 community settings:\r\n\r\n\r\n\u003e show snmpcommunity\r\nSNMP Community Name Client IP Address  Client IP Mask  Access Mode Status  ----------------     -----------     --------------    ----------  public              0.0.0.0         0.0.0.0          Read Only      Enable  **********          0.0.0.0         0.0.0.0          Read/Write     Enable\r\n\r\nThe following example shows how to delete an active SNMP Community:\r\n\r\n          \u003e config\u003e snmp community delete private\r\n\r\n      \u003e show snmpcommunity\r\n\r\n\r\n\r\n     SNMP Community Name Client IP Address  Client IP Mask  Access Mode Status\r\n     ----------------     -----------     --------------    ----------       public              0.0.0.0         0.0.0.0          Read Only      Enable\r\n\r\nThe following example shows how to configure an SNMP Community:\r\n\r\n     \u003e config\u003e snmp community create SNMP_Community\r\n\r\n      \u003eshow snmpcommunity\r\n\r\n\r\n      SNMP Community Name Client IP Address  Client IP Mask  Access Mode Status\r\n      ----------------     -----------     --------------    ----------        SNMP_Community      0.0.0.0         0.0.0.0         Read Only      Enable\r\n\r\n\r\n\r\n\r\nNote: Ensure that the SNMP settings match between the controller and the Wireless Control\r\n  System (WCS)/Network Control System(NCS)/Prime Infrastructure (PI). In addition, use encryption and hash keys that match the security policies.\r\nThe Cisco Wireless LAN Controller Configuration Best Practices guide is available at the following URL: https://www.cisco.com/c/en/us/td/docs/wireless/technology/wlc/8-5/82463-wlc-config-best-practice.html#pgfId-379998 [\"https://www.cisco.com/c/en/us/td/docs/wireless/technology/wlc/8-5/82463-wlc-config-best-practice.html#pgfId-379998\"]",
        "title": "Recommendations"
      },
      {
        "category": "general",
        "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
        "title": "Vulnerability Policy"
      },
      {
        "category": "general",
        "text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the issue that is described in this advisory.",
        "title": "Exploitation and Public Announcements"
      },
      {
        "category": "general",
        "text": "Cisco would like to thank Jim Thomas, Senior Security Architect with Insight, for reporting this issue.",
        "title": "Source"
      },
      {
        "category": "legal_disclaimer",
        "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
        "title": "Legal Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
      "issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
      "name": "Cisco",
      "namespace": "https://wwww.cisco.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "Cisco Wireless LAN Controller Default Simple Network Management Protocol Community Strings",
        "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wlc"
      },
      {
        "category": "external",
        "summary": "Cisco Security Vulnerability Policy",
        "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
      },
      {
        "category": "external",
        "summary": "Cisco Wireless LAN Controller Configuration Best Practices guide",
        "url": "https://www.cisco.com/c/en/us/td/docs/wireless/technology/wlc/8-5/82463-wlc-config-best-practice.html#pgfId-379998"
      },
      {
        "category": "external",
        "summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wlc",
        "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-wlc"
      },
      {
        "category": "external",
        "summary": "https://www.cisco.com/c/en/us/td/docs/wireless/technology/wlc/8-5/82463-wlc-config-best-practice.html#pgfId-379998",
        "url": "https://www.cisco.com/c/en/us/td/docs/wireless/technology/wlc/8-5/82463-wlc-config-best-practice.html#pgfId-379998"
      },
      {
        "category": "external",
        "summary": "Security Vulnerability Policy",
        "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
      }
    ],
    "title": "Cisco Wireless LAN Controller Default Simple Network Management Protocol Community Strings",
    "tracking": {
      "current_release_date": "2018-04-23T21:00:00+00:00",
      "generator": {
        "date": "2022-09-03T03:14:11+00:00",
        "engine": {
          "name": "TVCE"
        }
      },
      "id": "cisco-sa-20180418-wlc",
      "initial_release_date": "2018-04-18T16:00:00+00:00",
      "revision_history": [
        {
          "date": "2018-04-18T15:40:49+00:00",
          "number": "1.0.0",
          "summary": "Initial public release."
        },
        {
          "date": "2018-04-23T21:00:06+00:00",
          "number": "1.1.0",
          "summary": "Updated the \"Recommendations\" section, including the example output for the \u0027show snmpcommunity\u0027 command. Configuration examples that create, delete, and verify SNMP communities were added. The \u0027Summary\u0027 section was updated to include information about \u0027default usernames\u0027 and \u0027default communities.\u0027"
        }
      ],
      "status": "final",
      "version": "1.1.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_family",
            "name": "Cisco Wireless LAN Controller (WLC)",
            "product": {
              "name": "Cisco Wireless LAN Controller (WLC) ",
              "product_id": "CSAFPID-7368"
            }
          }
        ],
        "category": "vendor",
        "name": "Cisco"
      }
    ]
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…