Cisco Routers, Switches, IP Phones and Cameras getting hacked

Several Cisco-manufactured network equipments have been found vulnerable to five new security vulnerabilities that could allow hackers to take complete control over them, and subsequently, over the enterprise networks they power.

Four of the five high-severity bugs are remote code execution issues affecting Cisco routers, switches, and IP cameras, whereas the fifth vulnerability is a denial-of-service issue affecting Cisco IP phones.

Collectively dubbed ‘CDPwn,’ the reported vulnerabilities reside in the various implementations of the Cisco Discovery Protocol (CDP) that comes enabled by default on virtually all Cisco devices and can not be turned OFF.

Cisco Discovery Protocol (CDP) is an administrative protocol that works at Layer 2 of the Internet Protocol (IP) stack. The protocol has been designed to let devices discover information about other locally attached Cisco equipment in the same network.

According to a report Armis research team shared with The Hacker News, the underlying CDP implementations contain buffer overflow and format string vulnerabilities that could let remote attackers on the same network execute arbitrary code on the vulnerable devices by sending malicious unauthenticated CDP packets.

The list of CDPwn Cisco vulnerabilities affecting tens of millions of devices widely deployed in enterprise networks is as follow:

  • Cisco NX-OS Stack Overflow in the Power Request TLV (CVE-2020-3119)
  • Cisco IOS XR Format String vulnerability in multiple TLVs (CVE-2020-3118)
  • Cisco IP Phones Stack Overflow in PortID TLV (CVE-2020-3111)
  • Cisco IP Cameras Heap Overflow in DeviceID TLV (CVE-2020-3110)
  • Cisco FXOS, IOS XR, and NX-OS Resource Exhaustion in the Addresses TLV (CVE-2020-3120)

To be noted, since CDP is a Data Link layer 2 protocol that can’t cross the boundaries of a local area network, an attacker first needs to be on the same network to leverage CDPwn vulnerabilities.

Additionally, CDPwn flaws also allow attackers to:

  • Eavesdrop on voice and video data/calls and video feed from IP phones and cameras, capture sensitive conversations or images.
  • Exfiltrate sensitive corporate data flowing through the corporate network’s switches and routers.
  • Compromise additional devices by leveraging man-in-the-middle attacks to intercept and alter traffic on the corporate switch.

Besides releasing a detailed technical report on the issues, the Armis research team has also shared videos of explanation and demonstration of the flaws, as embedded above.

After closely working with Armis researchers over the last few months to develop security patches, Cisco today released software updates for all of its affected products.

Though Cisco has also provided some mitigation information, affected administrators are still highly recommended to install the latest software updates to completely protect their valuable networks against malware and emerging online threats.

author avatar
Prashant is an entrepreneur, author, researcher, and educator. He has done his B.tech from KIIT University, masters in Cyber Security from EURECOM, France and post-masters from IIT Delhi in Entrepreneurship. He has previously worked with brands like Google, BMW, etc across the globe. He is also an electric vehicle enthusiast. Prashant has published over 10+ research papers and 1 book. His research paper was awarded the best paper in "Junior Science Congress" by then-president Dr. A. P. J Abdul Kalam.You can book him as a mentor from: https://findmementor.com/mentee/view_details/prashantsavior

Leave A Reply

Your email address will not be published. Required fields are marked *