Re: The Trivial Cisco IP Phones Compromise

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 19 Sep 2002 16:32:43 -0400, you wrote:

>1.  Access to the Cisco 7960 IP phone:
>
>    A Cisco model 7960 IP phone running a SIP-compatible image has a
>    password that can be set by the IP phone administrator.  The default
>    password is "cisco" if the password has not been set to some other
>    value.  Cisco strongly recommends setting the password to something
>    other than the default.

There have been discussion going on (and off) about the danger of
default passwords. How long does it take before so-called secure aware
companies become really aware of security issues?

>    The key sequence of "**#" is not intended as a password.  It is
>    clearly and publicly documented in many places within Cisco's
>    product literature.  The key sequence is solely intended to protect
>    against casual or accidental changes to the phone's configuration.

Then just don't accept is as a password. It's that simple, isn't it?

>2.  Abuse of the TFTP service:
>
>    Although the author is correct that various attacks against the TFTP
>    service can be mounted, there are several measures that can be
>    employed by the IP phone administrator and the organization to
>    mitigate the risk. 
>
>    If the network is firewalled properly so that the different network
>    segments are compartmentalized as the Cisco SAFE white papers
>    recommend, then the TFTP server will only respond to legitimate
>    requests.  The TFTP server does not need to reside on the same
>    network segment as the IP phone.  If RFC 1918 addressing is employed
>    for the IP phones and proper ingress/egress filtering is in place as
>    recommended, then any such attack is highly unlikely to succeed from
>    outside the enterprise VoIP network, even with the use of UDP.
>    Access to the physical networks from within the enterprise may make
>    it easier to succeed with the attack, but if the VLANs are properly
>    protected and MAC addresses monitored per the SAFE documents -- for
>    example, by using arpwatch or arpsnmp -- then an attack may be
>    detected by the IP phone administrators. 

Not in all situations the IP phones are within one network. Sometimes
the phones are used by home workers. And not all ADSL- and
cable-companies allow IPsec over their network. At least not when you
have a consumer version of the connection. If you want IPsec you have to
buy the expensive business version for all the home workers.


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux