Cisco Removes Backdoor Account, Fourth Incident in the Last Four Months (bleepingcomputer.com) 51
For the fourth time this year, Cisco has removed hardcoded credentials that were left inside one of its products, which an attacker could have exploited to gain access to devices and inherently to customer networks. From a report: This time around, the hardcoded password was found in Cisco's Wide Area Application Services (WAAS), which is a software package that runs on Cisco hardware that can optimize WAN traffic management. This backdoor mechanism (CVE-2018-0329) was in the form of a hardcoded, read-only SNMP community string in the configuration file of the SNMP daemon. SNMP stands for Simple Network Management Protocol, an Internet protocol for collecting data about and from remote devices. The community string was there so SNMP servers knowing the string's value could connect to the remote Cisco device and gather statistics and system information about it.
Fool me once, shame on you... (Score:5, Insightful)
Re: Fool me once, shame on you... (Score:1)
Linksys is a cisco subsidiary....
Code Reviews (Score:2)
They aren't an excuse for eating bagels.
Re: (Score:1)
It would not be the firdt time someone released a debug build in the wild.
Re: (Score:2)
You'll get fired for buying Cisco in my company but not in the Fortune 500, where blame is paramount to functionality. Cisco sells "blame us" for huge dollar values.
Speaking of which, are any of the open-platform linux 10-gig switches under $5K yet?
No news here (Score:1)
The string is probably "public."
Re: (Score:2)
HAW. HAW? ow! (Score:2)
How can this be so difficult? (Score:1)
This sort of thing really gets the wrong spin (Score:2, Interesting)
Re: (Score:1)
It shows Cisco is riddled with incompetent developers who are too stupid to get even the most simple hello world problem: "do not put backdoors in your work" wrong. So it doesn't matter if there is now a single guy on top who goes through all the code and makes them work it over. I means the developers there are too stupid to be trusted with anything. And all those lines by those same stupid developers are still in there. They still made the millions or even billions of LOC in Cisco firmware which Cisco can
Re: (Score:1)
Wasn't that always someone else (outside the company) finding those backdoors - just saying.
Re: (Score:2)
a) CISCO's development process is fundamentally broken and there security vetting so flawed as to be laughably competent or
b) they are intentionally malicious.
neither scenario is good news. These are not standard security flaws that should be expected and discovered.
Re: (Score:2)
The NSA demands such support and it has to be done.
Thats the very best way of thinking about it. Its just part of the product line. To help consumer, to help the NSA.
The next options are much more fun.
The NSA and other US agencies have placed staff in a lot of big brands who do this code "undercover" and live for every generation of product.
Other U
Re: (Score:2)
Re: (Score:3)
Thats some interesting power over publication and research.
Re: (Score:2)
C'mon Cisco (Score:5, Funny)
No need to worry about Kaspersky or Huawei. (Score:2)
We don't need Russian or Chinese companies to open Americans' devices to foreign governments, Cisco is doing a good job by themselves.