[c-nsp] Recent 3750X oddity

Bryan Holloway bryan at shout.net
Wed Sep 27 20:16:56 EDT 2017


Thank you, everyone!


On 9/27/17 12:52 PM, Jim Glassford wrote:
> 
> 
> On 9/27/2017 1:47 PM, Chris Russell wrote:
>> On 27/09/2017 16:44, Bryan Holloway wrote:
>>> In case anyone's interested, this problem mysteriously stopped
>>> occurring about two days after I first reported it to the list.
>>>
>>> Curiously enough, it started happening again on Monday, September
>>> 25th, and again it has gone silent.
>>
>>  This is a bug - can't remember the bug id, but its a vstack DoS, the 
>> original bug ID shows as fixed however we've had acknowledgement from 
>> Cisco this isn't the case and it won't be fixed till E7.
>>
>>  Workaround: If you don't use vstack, type "no vstack"
>>
>> Cheers
>>
>> Chris
>>
> 
> 
> FYI on the vstack
> 
> Cisco Security Response: Cisco Smart Install Protocol Misuse
> 
> Response ID: cisco-sr-20170214-smi
> 
> Revision 1.0
> 
> For Public Release 2017 February 14 16:00  UTC (GMT)
> 
> +---------------------------------------------------------------------
> 
> Summary
> =======
> 
> Several researchers have reported on the use of Smart Install (SMI) 
> protocol messages
> toward Smart Install clients, also known as integrated branch clients 
> (IBC), allowing an
> unauthenticated, remote attacker to change the startup-config file and 
> force a reload of the
> device, upgrade the IOS image on the device, and execute high-privilege 
> CLI commands on
> switches running Cisco IOS and IOS XE Software.
> 
> Cisco does not consider this a vulnerability in Cisco IOS, IOS XE, or 
> the Smart Install
> feature itself but a misuse of the Smart Install protocol that by design 
> does not require
> authentication. Customers who seek more than zero-touch deployment 
> should consider deploying
> the Cisco Network Plug and Play solution instead.
> 
> Cisco has updated the Smart Install Configuration Guide to include 
> security best practices
> regarding the deployment of the Cisco Smart Install feature within 
> customer infrastructures:
> http://www.cisco.com/c/en/us/td/docs/switches/lan/smart_install/configuration/guide/smart_install/concepts.html#23355 
> 
> 
> This response is available at the following link:
> https://tools.cisco.com/security/center/content/CiscoSecurityResponse/cisco-sr-20170214-smi 
> 
> 
> 
> 
> _______________________________________________
> cisco-nsp mailing list  cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/


More information about the cisco-nsp mailing list