owning the data centre cisco nx os
play

Owning the data centre, Cisco NX-OS George Hedfors Working for - PowerPoint PPT Presentation

Owning the data centre, Cisco NX-OS George Hedfors Working for Cybercom Sweden East AB (http://www.cybercomgroup.com) 12 years as IT- and information security consultant Previously worked for iX Security, Defcom, NetSec, n.runs and


  1. Owning the data centre, Cisco NX-OS George Hedfors • Working for Cybercom Sweden East AB (http://www.cybercomgroup.com) • 12 years as IT- and information security consultant – Previously worked for iX Security, Defcom, NetSec, n.runs and Pinion Contact george.hedfors@cybercomgroup.com Web page http://george.hedfors.com 2011-03-18 1 Black Hat Europe 2011

  2. Topics • Short intro to Cisco NX-OS • History of research • Overview of underlying Linux • Disclosure of vulnerabilities – Undocumented CLi commands – Command line interface escape – Layer 2 attack – Undocumented user account – 2 nd CLi escape (delayed) – IDDQD… • FAQ 2011-03-18 2 Black Hat Europe 2011

  3. What is NX-OS? • Based on MontaVista (http://www.mvista.com) embedded Linux with kernel 2.6.10 • VDC Virtualization, Virtual Device Context Nexus 4000 (for IBM BladeCenter) Nexus 5000 Nexus 7000 MDS 9500 FC Directors MDS 9222i FC Switch MDS 9100 FC Switches 2011-03-18 3 Black Hat Europe 2011

  4. What has been done • Accidentally made a Cisco-7020 fall over due to an 9 years old denial of service attack • Was able to recover CORE dumps from the attack • Able to extract all files from the Cisco .bin installation package • Found a number of exploitable vulnerabilities To do • Dig deeper into Cisco VDC/VRF security 2011-03-18 4 Black Hat Europe 2011

  5. Cisco 7000-series Typical environment • Banking/finance • Other large data centers Impact • Full exposure of interconnected networks and VLAN’s • Possibility to eavesdrop and traffic modification • Switch based rootkit installation? 2011-03-18 5 Black Hat Europe 2011

  6. Overview LINUX 2011-03-18 6 Black Hat Europe 2011

  7. Teh Linux ! ? t ? o o r 2011-03-18 7 Black Hat Europe 2011

  8. Hidden commands DC3 Shell ‘the regular Cisco cli’ • Configurations contain ‘hidden’ commands 2011-03-18 8 Black Hat Europe 2011

  9. Escaping CLi 2011-03-18 9 Black Hat Europe 2011

  10. How could that happened?! What could possibly go wrong here? /usr/bin/gdbserver 2011-03-18 10 Black Hat Europe 2011

  11. Br0ken architecture Everything is running as root . . . ? ? e l b a x i f n Everyone can execute with SUDO e v e s i h t s I Even binaries execute using SUDO.. 2010-07-06 11 Company presentation

  12. What about layer 2? Cisco Discovery Protocol (CDP) • 2001, FX crafted the first CDP DoS attack • 2010, the CDP attack was rediscovered in NX-OS • CDP has become demonized and is now running under the ‘root’ user context 2011-03-18 12 Black Hat Europe 2011

  13. The core dump 2011-03-18 13 Black Hat Europe 2011

  14. CDP Daemon vulnerability analysis • More then 255 bytes is used as ‘Device ID’ to cause the segfault. • The protocol specification allows length as a 16-bit integer. 2010-07-06 14 Company presentation

  15. CDP Daemon vulnerability analysis Debugging: = (unsigned __int16)(payload - 4); // size field = payload - 4 + 1; (void *) = cdpd_malloc(13, ); … memset( , 0, ); memcpy( , (const void *)(packet_ptr + 4), ); 0x 57 8 (int) 1400 0x 57 (byte) 87 Anything larger than 255 is truncated causing a consecutive HEAP overflow… 2010-07-06 15 Company presentation

  16. Undocumented user account So, where ‘ftpuser’ come from? Default user? Backdoor? Easter egg? Recovered password ‘nbv123’ 2011-03-18 16 Black Hat Europe 2011

  17. Searching for ‘nbv123’ 2011-03-18 17 Black Hat Europe 2011

  18. IDDQD? God Mode!! 2011-03-18 18 Black Hat Europe 2011

  19. Bug tracking • CSCti03724 – CLI escape in NX-OS using GDB – Workaround: None – Fixed in NX-OS 4.1(4) • CSCti04026 – Undocumented user available with default password on NX-OS system – Workaround: None • CSCtf08873 – CDP with long hostname crashes CDPD on N7k – Workaround: Disable CDP • CSCti85295 – NX-OS: SUDO privilege escalation – Workaround: None 2011-03-18 19 Black Hat Europe 2011

  20. Thanks Special thanks to Juan-Manuel Gonzales, PSIRT Incident Manager <juagonza@cisco.com> 2011-03-18 20 Black Hat Europe 2011

  21. FAQ Questions? Contact george.hedfors@cybercomgroup.com 2011-03-18 21 Black Hat Europe 2011

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend