Vulnslist

find the latest Cisco vulnerabilities

Portable SDK for UPnP Devices Contains Buffer Overflow Vulnerabilities

cisco-sa-20130129-upnp · Critical · Published · Updated

The Portable Software Developer Kit (SDK) for Universal Plug-n-Play (UPnP) Devices contains a libupnp library, originally known as the Intel SDK for UPnP Devices, which is vulnerable to multiple stack-based buffer overflows when handling malicious Simple Service Discovery Protocol (SSDP) requests. This library is used in several vendor network devices, in addition to media streaming and file sharing applications. These vulnerabilities were disclosed on January 29th, 2013 in a CERT Vulnerability Note, VU#922681, which can be viewed at http://www.kb.cert.org/vuls/id/922681. Cisco is currently evaluating products for possible exposure to these vulnerabilities. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp

Workarounds

UPnP can be disabled on many devices using the Web User Interface. Instructions on how to disable UPnP are generally given in the Product Administration Guide. For example, in the "Configuring Basic Firewall Settings" section of the RV-120W Administration Guide, there is a checkbox to enable/disable UPnP. For additional information, see http://www.cisco.com/en/US/docs/routers/csbr/rv110w/administration/guide/rv110w_admin.pdf#page84http://www.cisco.com/en/US/docs/routers/csbr/rv110w/administration/guide/rv110w_admin.pdf#page84 .

Customers should follow basic hardening rules when configuring wireless devices, such as not allowing "Guest" access and requiring authentication credentials to login.

Customers can also block traffic from untrusted hosts on UDP port 1900 to affected devices using infrastructure access control lists (iACLs). This protection mechanism filters and drops packets that are attempting to exploit these vulnerabilities.

Effective exploit prevention can also be provided by the Cisco ASA 5500 Series Adaptive Security Appliance and the Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series switches and Cisco 7600 Series routers using transit access control lists (tACLs).

Cisco has released an Applied Mitigation Bulletin (AMB) that explains how to detect and mitigate potential exploitation of these vulnerabilities. The AMB is available at:  http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=28005http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=28005 http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-amb-20130129-upnp

CVEsCVE-2012-5958
Cisco Bug IDsCSCue19318, CSCue20997, CSCue21009, CSCue21031, CSCue21578
CVSS ScoreBase 10.0
Base 10.0 AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:U/RC:C
Product Names From Source
Cisco PVC2300 Business Internet Video Camera - Audio/PoE Firmware, Cisco RVS4000 Gigabit Security Router - VPN Firmware, Cisco WRVS4400N Gigabit Security Router, Cisco SA500 Series Security Appliance, Cisco WRP400 Wireless-G Broadband Router with 2 Phone Ports Firmware

Related Products

Product CVE Evidence
Cisco RV Series Routers CVE-2012-5958 Cisco OpenVuln
Cisco Nexus Dashboard CVE-2012-5958 Cisco OpenVuln
Cisco WRVS4400N Gigabit Security Router CVE-2012-5958 Cisco OpenVuln
Cisco WRP400 Wireless-G Broadband Router with 2 Phone Ports Firmware CVE-2012-5958 Cisco OpenVuln
Cisco SA500 Series Security Appliance CVE-2012-5958 Cisco OpenVuln
Cisco RVS4000 Gigabit Security Router - VPN Firmware CVE-2012-5958 Cisco OpenVuln
Cisco PVC2300 Business Internet Video Camera - Audio/PoE Firmware CVE-2012-5958 Cisco OpenVuln