Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

TCP Vulnerabilities in Multiple Non-IOS Cisco Products

cisco-sa-20040420-tcp-nonios · Medium · Published · Updated

A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been discovered by an external researcher. The successful exploitation enables an adversary to reset any established TCP connection in a much shorter time than was previously discussed publicly. Depending on the application, the connection may get automatically re-established. In other cases, a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending upon the attacked protocol, a successful attack may have additional consequences beyond terminated connection which must be considered. This attack vector is only applicable to the sessions which are terminating on a device (such as a router, switch, or computer), and not to the sessions that are only passing through the device (for example, transit traffic that is being routed by a router). In addition, the attack vector does not directly compromise data integrity or confidentiality. All Cisco products which contain a TCP stack are susceptible to this vulnerability. This advisory is available at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040420-tcp-nonios, and it describes this vulnerability as it applies to Cisco products that do not run Cisco IOS® software. A companion advisory that describes this vulnerability for products that run Cisco IOS software is available at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20040420-tcp-ios.

Cisco advisory · CSAF JSON

Workarounds

The effectiveness of any workaround is dependent on specific customer situations such as product mix, network topology, traffic behavior, and organizational mission. Due to the variety of affected products and releases, customers should consult with their service provider or support organization to ensure any applied workaround is the most appropriate for use in the intended network before it is deployed.

There are no workarounds available to mitigate the effects of this vulnerability.

It is possible to mitigate the exposure on this vulnerability by applying anti-spoofing measures on the edge of the network.

By enabling Unicast Reverse Path Forwarding (uRPF), all spoofed packets will be dropped at the first device. To enable uRPF, use the following commands.

router(config)#ip cef
router(config)#interface router(config-if)#ip verify unicast reverse-path

Please consult http://www.cisco.com/en/US/docs/ios/12_2t/12_2t13/feature/guide/ft_urpf.html ["http://www.cisco.com/en/US/docs/ios/12_2t/12_2t13/feature/guide/ft_urpf.html"] and ftp://ftp-eng.cisco.com/cons/isp/security/URPF-ISP.pdf ["ftp://ftp-eng.cisco.com/cons/isp/security/URPF-ISP.pdf"] for further descriptions of how uRPF works and how to configure it in various scenarios. This is especially important if you are using asymmetric routing.

Access control lists (ACLs) should also be deployed as close to the edge as possible. Unlike uRPF, you must specify the exact IP range that is permitted. Specifying which addresses should be blocked is not the optimal solution because it tends to be harder to maintain.

Caution: In order for anti-spoofing measures to be effective, they must be deployed at least one hop away from the devices which are being protected. Ideally, they will be deployed at the network edge.

CVEsCVE-2004-0230
Cisco Bug IDsCSCuq38097
CVSS ScoreBase 5.0
Base 5.0 AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:U/RC:C
Product Names From Source
Cisco Cache Engine, Cisco Content Router, Cisco Intelligent Contact Manager (ICM), Cisco Optical Networking Systems (ONS), Cisco Secure Access Control Server (ACS) for UNIX, Cisco Secure Access Control Server (ACS) for Windows, Cisco Content Distribution Manager (CDM), Cisco Content Engine, Cisco Content Services Switch (CSS), Cisco WAN Manager for AIX, Cisco Element Management Framework (Cisco EMF), CiscoWorks Hosting Solution Engine (HSE), Cisco Intrusion Detection System (IDS), Cisco LocalDirector, Cisco PIX Firewall Software, Cisco VPN 3000 Series Concentrator, Cisco VPN 5000 Series Concentrator, Cisco WebNS, Cisco IP phone, Cisco WAN Switching Software, CiscoWorks Wireless LAN Solution Engine (WLSE), Cisco GSS Global Site Selector, Cisco Firewall Services Module (FWSM), Cisco Catalyst WS-X6608, Cisco VG248 Analog Phone Gateway, Cisco MDS SAN-OS Software, Cisco Catalyst 1900/2820, Cisco Content Switching Module (CSM), Cisco Unified Communications Manager, Cisco Unified Computing System (Standalone)

Related Products

Product CVE Evidence
CiscoWorks Wireless LAN Solution Engine (WLSE) CVE-2004-0230 Cisco OpenVuln
CiscoWorks Hosting Solution Engine (HSE) CVE-2004-0230 Cisco OpenVuln
Cisco WebNS CVE-2004-0230 Cisco OpenVuln
Cisco WAN Switching Software CVE-2004-0230 Cisco OpenVuln
Cisco WAN Manager for AIX CVE-2004-0230 Cisco OpenVuln
Cisco WAN Manager CVE-2004-0230 Cisco OpenVuln
Cisco VPN 5000 Series Concentrator CVE-2004-0230 Cisco OpenVuln
Cisco VPN 3000 Series Concentrator CVE-2004-0230 Cisco OpenVuln
Cisco VG248 Analog Phone Gateway CVE-2004-0230 Cisco OpenVuln
Cisco Unified Computing System (Standalone) CVE-2004-0230 Cisco OpenVuln
Cisco Unified Communications Manager CVE-2004-0230 Cisco OpenVuln
Cisco Secure Access Control Server (ACS) for Windows CVE-2004-0230 Cisco OpenVuln
Cisco Secure Access Control Server (ACS) for UNIX CVE-2004-0230 Cisco OpenVuln
Cisco PIX Firewall Software CVE-2004-0230 Cisco OpenVuln
Cisco PIX Firewall CVE-2004-0230 Cisco OpenVuln
Cisco Optical Networking Systems (ONS) CVE-2004-0230 Cisco OpenVuln
Cisco MDS SAN-OS Software CVE-2004-0230 Cisco OpenVuln
Cisco LocalDirector CVE-2004-0230 Cisco OpenVuln
Cisco Intrusion Detection System (IDS) CVE-2004-0230 Cisco OpenVuln
Cisco Intelligent Contact Manager (ICM) CVE-2004-0230 Cisco OpenVuln
Cisco IP phone CVE-2004-0230 Cisco OpenVuln
Cisco IOS CVE-2004-0230 Cisco OpenVuln
Cisco GSS Global Site Selector CVE-2004-0230 Cisco OpenVuln
Cisco Firewall Services Module (FWSM) CVE-2004-0230 Cisco OpenVuln
Cisco Element Management Framework (Cisco EMF) CVE-2004-0230 Cisco OpenVuln
Cisco Content Switching Module (CSM) CVE-2004-0230 Cisco OpenVuln
Cisco Content Services Switch (CSS) CVE-2004-0230 Cisco OpenVuln
Cisco Content Router CVE-2004-0230 Cisco OpenVuln
Cisco Content Engine CVE-2004-0230 Cisco OpenVuln
Cisco Content Distribution Manager (CDM) CVE-2004-0230 Cisco OpenVuln
Cisco Catalyst WS-X6608 CVE-2004-0230 Cisco OpenVuln
Cisco Catalyst 1900/2820 CVE-2004-0230 Cisco OpenVuln
Cisco Cache Engine CVE-2004-0230 Cisco OpenVuln