{"id":278320,"date":"2010-02-04T20:05:23","date_gmt":"2010-02-05T01:05:23","guid":{"rendered":"http:\/\/www.stoth.com\/2010\/02\/04\/ciscos-wiretapping-system-open-to-exploit-says-researcher\/"},"modified":"2010-02-04T20:05:23","modified_gmt":"2010-02-05T01:05:23","slug":"cisco%e2%80%99s-wiretapping-system-open-to-exploit-says-researcher","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/278320","title":{"rendered":"Cisco\u2019s wiretapping system open to exploit, says researcher"},"content":{"rendered":"<p><\/p>\n<p><!--body--><\/p>\n<p>\nTo meet the needs of law enforcement, most telecommunications equipment includes hardware and software that allow for the monitoring of traffic originating with the targets of investigations.  The precise capabilities are often dictated by formalized standards, which allow any hardware maker to implement a compliant system.  Unfortunately, these standards often leave the hardware <a href=\"http:\/\/arstechnica.com\/security\/news\/2009\/11\/a-single-smartphone-can-dos-federal-wiretaps.ars\">wide open to various attacks<\/a> that leave regular users vulnerable, and provide savvy surveillance targets the opportunity to evade the snooping.  An IBM researcher has put Cisco&#8217;s system <a href=\"http:\/\/www.blackhat.com\/html\/bh-dc-10\/bh-dc-10-briefings.html#Cross\">under the microscope<\/a> at a Black Hat Conference, and found it comes up short.\n<\/p>\n<p>\nAlthough the standard was designed to put Cisco hardware in compliance with EU directives, it has apparently been adopted by a number of other hardware makers.  The presentation, <a href=\"http:\/\/www.darkreading.com\/insiderthreat\/security\/perimeter\/showArticle.jhtml?articleID=222600993\">described in detail<\/a> by Dark Reading, describes how its reliance on SNMPv3, creates a variety of options for attack.  For example, the protocol was initially vulnerable to a brute force attacks on its authentication system; although Cisco has patched that flaw, there&#8217;s no way to determine how many unpatched machines remain in the wild.\n<\/p>\n<p>\nSNMP also defaults to operating over UDP, and it&#8217;s relatively easy to spoof things like the source address and port for that protocol.  It&#8217;s possible to use TCP instead, and even limit the addresses that can access the hardware, but the protocol doesn&#8217;t specify either of these.  Communications aren&#8217;t encrypted by default, and the system won&#8217;t notify administrators when a trace is activated or disabled, meaning that hackers could potentially set up or eliminate surveillance without anyone being aware of it.\n<\/p>\n<p>\nThe IBM researcher, Tom Cross, notified Cisco of the issues back in December, and recommends revisions to the standard that will ensure that it is more secure by default.  That might be helpful, but it still wouldn&#8217;t deal with the problems posed by unpatched systems&#8212;Cross himself apparently recognizes that network administrators can be hesitant to risk the disruption of service that may come with updating major pieces of equipment.\n<\/p>\n<p><a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/F_SEQvC7fnqVnDRyctn4YQeoIA0\/0\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~at\/F_SEQvC7fnqVnDRyctn4YQeoIA0\/0\/di\" border=\"0\"><\/img><\/a><br \/>\n<a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/F_SEQvC7fnqVnDRyctn4YQeoIA0\/1\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~at\/F_SEQvC7fnqVnDRyctn4YQeoIA0\/1\/di\" border=\"0\"><\/img><\/a><\/p>\n<div>\n<a href=\"http:\/\/feeds.arstechnica.com\/~ff\/arstechnica\/index?a=SfL4bu2kMng:aKwOg3SkenU:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?i=SfL4bu2kMng:aKwOg3SkenU:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.arstechnica.com\/~ff\/arstechnica\/index?a=SfL4bu2kMng:aKwOg3SkenU:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?i=SfL4bu2kMng:aKwOg3SkenU:F7zBnMyn0Lo\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.arstechnica.com\/~ff\/arstechnica\/index?a=SfL4bu2kMng:aKwOg3SkenU:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.arstechnica.com\/~ff\/arstechnica\/index?a=SfL4bu2kMng:aKwOg3SkenU:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/arstechnica\/index\/~4\/SfL4bu2kMng\" height=\"1\" width=\"1\" \/> <\/p>\n<p>Buy This Item: <a class=\"buy\" href=\"http:\/\/www.stoth.com\/buy.php\" ><span style=\"color: #33bc03\">[Click here to buy this item]<\/span><\/a><\/p>\n<p><a href=\"http:\/\/feeds.arstechnica.com\/~r\/arstechnica\/index\/~3\/SfL4bu2kMng\/ciscos-wiretapping-system-open-to-exploit-says-researcher.ars\" >Article<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To meet the needs of law enforcement, most telecommunications equipment includes hardware and software that allow for the monitoring of traffic originating with the targets of investigations. The precise capabilities are often dictated by formalized standards, which allow any hardware maker to implement a compliant system. Unfortunately, these standards often leave the hardware wide open [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-278320","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/278320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=278320"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/278320\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=278320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=278320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=278320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}