Cisco Security Manager – Remote Code Execution
Recently, multiple critical and easy-to-exploit remote code execution (RCE) vulnerabilities were found in Cisco Security Manager. These vulnerabilities allow an unauthenticated remote attacker with network access via HTTP to achieve total compromise and takeover of vulnerable servers. The vulnerabilities affect version 4.21 and earlier. Cisco Security Manager version 4.22 patches these vulnerabilities.
Cisco did not mention these vulnerabilities in the release notes for version 4.22 and also did not publish any additional advisories on how to mitigate these if updating the version was not possible. Florian Hauser, a security researcher from Code White initially reported the bugs to Cisco on July 13th. Since Cisco did not acknowledge any of these vulnerabilities, he published proof of concept (PoC) exploits for 12 vulnerabilities affecting Cisco Security Manager on November 16th.
Figure 1 Tweet from @frycos, Florian Hauser’s Twitter handle
In this article, we will focus on the RCE vulnerabilities and how Big IP Advanced WAF protects our customers against these exploits.
Remote Code Execution using SecretService.jsp
A malicious request exploiting this vulnerability is shown in Figure 2.
Figure 2 Exploit request
Remote Code Execution using AuthTokenServlet
A malicious request exploiting this vulnerability is shown in Figure 3.Figure 3 Exploit request
Remote Code Execution using ClientServicesServlet
A malicious request exploiting this vulnerability is shown in Figure 4.
Figure 4 Exploit request
Remote Code Execution using CTMServlet
A malicious request exploiting this vulnerability is shown in Figure 5.
Figure 5 Exploit request
Remote Code Execution using SecretServiceServlet
A malicious request exploiting this vulnerability is shown in Figure 6.
Figure 6 Exploit request
Mitigation with BIG-IP Advanced WAF
Advanced WAF customers under any supported BIG-IP version are already protected against this exploit.
An exploitation attempt will trigger a violation caused by “Bad unescape” evasion technique and will also be detected by many existing signatures for Java code injection and Java serialized object.
Figure 7 Bad unescape evasion technique detected
Figure 8 Various Java code injection and Java serialized object signatures are triggered by the exploit request