Cisco Systems Inc. is warning customers of a flaw in its Cisco Clean Access (CCA) and Clean Access Manager (CAM)...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
software that could be exploited by an attacker to download and view database snapshots without authentication.
The software works together to detect, isolate and clean infected or vulnerable devices that attempt to access the company network.
Cisco's Product Security Incident Response Team (PSIRT) said on Wednesday that the Clean Access Manager has an unchangeable shared secret flaw. Due to this vulnerability the shared secret can not be properly set or changed, making it the same across all affected devices. In order to exploit this vulnerability, an attacker must be able to establish a TCP connection to the Clean Access Server, Cisco said in its advisory .
In addition, manual backups of the database taken by the CAM are susceptible to brute force download attacks, Cisco said. A malicious user can guess a file name and download it without authentication. The file itself is not encrypted or otherwise protected, Cisco said.
CCA releases 3.6.x - 18.104.22.168; 4.0.x - 22.214.171.124 and 3.5.x are affected, as is CAM versions 3.5.9 and 3.6.x - 126.96.36.199.
There are no workarounds for the flaws, PSIRT said.
The following software releases contain the fix for the shared secret flaw: 188.8.131.52, 4.0.4 and 4.1.0. The readable snapshot flaw is addressed in versions 3.5.10 and 3.6.2. All subsequent releases will contain the fix.