<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>

<META NAME="Generator" CONTENT="MS Exchange Server version 6.5.6944.0">
<TITLE>Re: [cisco-voip] FW: [c-nsp] Cisco Security Advisory: Cisco UnityIntegrated withExchange Has Default Passwords </TITLE>
</HEAD>
<BODY>
<DIV id=idOWAReplyText69014 dir=ltr>
<DIV dir=ltr><FONT face=Arial color=#000000 size=2>If I remember right, the 
install guide suggests you harden the passwords during the 
installation.</FONT></DIV></DIV>
<DIV dir=ltr><BR>
<HR tabIndex=-1>
<FONT face=Tahoma size=2><B>From:</B> cisco-voip-bounces@puck.nether.net on 
behalf of Ryan Ratliff<BR><B>Sent:</B> Wed 12/15/2004 2:15 PM<BR><B>To:</B> 
Voll, Scott<BR><B>Cc:</B> cisco-voip@puck.nether.net<BR><B>Subject:</B> Re: 
[cisco-voip] FW: [c-nsp] Cisco Security Advisory: Cisco UnityIntegrated 
withExchange Has Default Passwords <BR></FONT><BR></DIV>
<DIV>
<P><FONT size=2>Looks like you can disable them or just give them a good 
password.&nbsp;&nbsp;<BR>Definitely don't delete them if you like Unity to 
run.<BR><BR>-Ryan<BR>On Dec 15, 2004, at 1:01 PM, Voll, Scott wrote:<BR><BR>&gt; 
Did everyone see this?<BR>&gt;<BR>&gt; I'm I to understand that I can just 
disable all the accounts as my<BR>&gt; workaround?<BR>&gt;<BR>&gt; 
Scott<BR>&gt;<BR>&gt; -----Original Message-----<BR>&gt; From: 
cisco-nsp-bounces@puck.nether.net<BR>&gt; [<A 
href="mailto:cisco-nsp-bounces@puck.nether.net">mailto:cisco-nsp-bounces@puck.nether.net</A>] 
On Behalf Of Cisco Systems<BR>&gt; Product Security Incident Response 
Team<BR>&gt; Sent: Wednesday, December 15, 2004 8:45 AM<BR>&gt; To: 
cisco-nsp@puck.nether.net<BR>&gt; Cc: psirt@cisco.com<BR>&gt; Subject: [c-nsp] 
Cisco Security Advisory: Cisco Unity Integrated<BR>&gt; withExchange Has Default 
Passwords<BR>&gt;<BR>&gt; -----BEGIN PGP SIGNED MESSAGE-----<BR>&gt; Hash: 
SHA1<BR>&gt;<BR>&gt;<BR>&gt; 
=================================================================<BR>&gt; Cisco 
Security Advisory: Cisco Unity Integrated with Exchange Has<BR>&gt; Default 
Passwords<BR>&gt; 
=================================================================<BR>&gt;<BR>&gt; 
Revision 1.0: FINAL<BR>&gt;<BR>&gt; For Public Release 2004 December 15 1600 UTC 
(GMT)<BR>&gt;<BR>&gt; 
+----------------------------------------------------------------------<BR>&gt;<BR>&gt; 
Contents<BR>&gt; ========<BR>&gt;<BR>&gt;&nbsp;&nbsp;&nbsp;&nbsp; 
Summary<BR>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Affected 
Products<BR>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Details<BR>&gt;&nbsp;&nbsp;&nbsp;&nbsp; 
Impact<BR>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Software Versions and 
Fixes<BR>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Obtaining Fixed 
Software<BR>&gt;&nbsp;&nbsp;&nbsp;&nbsp; 
Workarounds<BR>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Exploitation and Public 
Announcements<BR>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Status of This Notice: 
FINAL<BR>&gt;&nbsp;&nbsp;&nbsp;&nbsp; 
Distribution<BR>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Revision 
History<BR>&gt;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Security 
Procedures<BR>&gt;<BR>&gt; 
+----------------------------------------------------------------------<BR>&gt;<BR>&gt; 
Summary<BR>&gt; =======<BR>&gt;<BR>&gt; Several default username/password 
combinations are present in all<BR>&gt; available releases of Cisco Unity when 
integrated with Microsoft<BR>&gt; Exchange. The accounts include a privileged 
administrative account, as<BR>&gt; well as several messaging accounts used for 
integration with other<BR>&gt; systems. An unauthorized user may be able to use 
these default accounts<BR>&gt; to read incoming and outgoing messages, and 
perform administrative<BR>&gt; functions on the Unity system.<BR>&gt;<BR>&gt; 
This vulnerability is documented in the Cisco Bug Toolkit as Bug ID<BR>&gt; 
CSCeg08552<BR>&gt;<BR>&gt; This advisory is available at<BR>&gt; <A 
href="http://www.cisco.com/warp/public/707/cisco-sa-20041215-unity.shtml">http://www.cisco.com/warp/public/707/cisco-sa-20041215-unity.shtml</A><BR>&gt;<BR>&gt; 
Affected Products<BR>&gt; =================<BR>&gt;<BR>&gt; Vulnerable 
Products<BR>&gt; +------------------<BR>&gt;<BR>&gt; Cisco Unity versions 2.x, 
3.x, and 4.x when integrated with Microsoft<BR>&gt; Exchange.<BR>&gt;<BR>&gt; 
Products Confirmed Not Vulnerable<BR>&gt; 
+--------------------------------<BR>&gt;<BR>&gt; The following products are 
confirmed not vulnerable:<BR>&gt;<BR>&gt;&nbsp;&nbsp; * Any version of Cisco 
Unity when integrated with Lotus Notes<BR>&gt;&nbsp;&nbsp; * Cisco Unity 
Express<BR>&gt;&nbsp;&nbsp; * Cisco CallManager and CallManager 
Express<BR>&gt;&nbsp;&nbsp; * Cisco MeetingPlace<BR>&gt;<BR>&gt; No other Cisco 
products are currently known to create these specific<BR>&gt; default 
account/passwords.<BR>&gt;<BR>&gt; Details<BR>&gt; =======<BR>&gt;<BR>&gt; Cisco 
Unity is a communications solution which delivers unified<BR>&gt; messaging 
(e-mail, voice, and fax messages sent to one inbox) and<BR>&gt; intelligent 
voice messaging. Cisco Unity integrates with desktop<BR>&gt; applications such 
as Microsoft Outlook and Lotus Notes.<BR>&gt;<BR>&gt; Several default 
username/password combinations are present in all<BR>&gt; releases Cisco Unity 
when integrated with Microsoft Exchange.<BR>&gt;<BR>&gt; An unauthorized user 
may be able to use these default accounts to read<BR>&gt; incoming and outgoing 
messages, or to perform administrative functions<BR>&gt; on the Unity 
system.<BR>&gt;<BR>&gt; The specified accounts with default passwords 
are:<BR>&gt;<BR>&gt; EAdmin&lt;systemid&gt;<BR>&gt; 
UNITY_&lt;servername&gt;<BR>&gt; UAMIS_&lt;servername&gt;<BR>&gt; 
UOMNI_&lt;servername&gt;<BR>&gt; UVPIM_&lt;servername&gt;<BR>&gt; 
ESubsubscriber<BR>&gt;<BR>&gt; This vulnerability is documented in the Cisco Bug 
Toolkit as Bug ID<BR>&gt; CSCeg08552<BR>&gt;<BR>&gt; Impact<BR>&gt; 
======<BR>&gt;<BR>&gt; An unauthorized user may utilize EAdmin&lt;systemid&gt; 
to access the Cisco<BR>&gt; Unity Administrator in order to create, edit, or 
delete classes of<BR>&gt; service, restriction tables, call routing tables, call 
handlers,<BR>&gt; schedules and holidays, subscribers, public distribution 
lists, or to<BR>&gt; perform other administrative functions.<BR>&gt;<BR>&gt; An 
unauthorized user may utilize UNITY_&lt;servername&gt;,&nbsp;<BR>&gt; 
UAMIS_&lt;servername&gt;,<BR>&gt; UOMNI_&lt;servername&gt;, or 
UVPIM_&lt;servername&gt; to read<BR>&gt; incoming and outgoing messages as they 
are passed to and from external<BR>&gt; voicemail systems. Please note that 
local messages which do not pass to<BR>&gt; non-Unity voicemail systems are not 
made visible by this vulnerability.<BR>&gt;<BR>&gt; ESubscriber is an example 
user account that conveys no administrative<BR>&gt; or other special abilities. 
However it is contrary to best security<BR>&gt; practices to have unused 
accounts with default passwords.<BR>&gt;<BR>&gt; Software Versions and 
Fixes<BR>&gt; ===========================<BR>&gt;<BR>&gt; Cisco Unity 4.0(5), 
which is scheduled for released in the first<BR>&gt; quarter of the calendar 
year 2005, will contain the fix for this issue<BR>&gt; for NEW INSTALLS 
ONLY.<BR>&gt;<BR>&gt; Note: An upgrade to Cisco Unity 4.0(5) from any previous 
version will<BR>&gt; still contain this vulnerability. Customers upgrading to 
version 4.0(5)<BR>&gt; from any previous version must apply the workaround 
listed below to<BR>&gt; eliminate the vulnerability.<BR>&gt;<BR>&gt; Obtaining 
Fixed Software<BR>&gt; ========================<BR>&gt;<BR>&gt; As the fix for 
this vulnerability is a default configuration change,<BR>&gt; and a workaround 
is available, a software upgrade is not required to<BR>&gt; address this 
vulnerability. However, if you have a service contract,<BR>&gt; and wish to 
upgrade to unaffected code, you may obtain upgraded<BR>&gt; software through 
your regular update channels once that software is<BR>&gt; available. For most 
customers, this means that upgrades should be<BR>&gt; obtained through the 
Software Center on Cisco's Worldwide Web site at<BR>&gt; <A 
href="http://www.cisco.com/">http://www.cisco.com/</A><BR>&gt;<BR>&gt; If you 
need assistance with the implementation of the workarounds, or<BR>&gt; have 
questions on the workarounds, please contact the Cisco Technical<BR>&gt; 
Assistance Center (TAC).<BR>&gt;<BR>&gt;&nbsp;&nbsp; * +1 800 553 2447 (toll 
free from within North America)<BR>&gt;&nbsp;&nbsp; * +1 408 526 7209 (toll call 
from anywhere in the world)<BR>&gt;&nbsp;&nbsp; * e-mail: 
tac@cisco.com<BR>&gt;<BR>&gt; See <A 
href="http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml">http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml</A> 
for<BR>&gt; additional TAC contact information, including special 
localized<BR>&gt; telephone numbers and instructions and e-mail addresses for 
use in<BR>&gt; various languages.<BR>&gt;<BR>&gt; Customers may only install and 
expect support for the feature sets they<BR>&gt; have purchased. By installing, 
downloading, accessing or otherwise<BR>&gt; using such software upgrades, 
customers agree to be bound by the terms<BR>&gt; of Cisco's software license 
terms found at<BR>&gt; <A 
href="http://www.cisco.com/public/sw-license-agreement.html">http://www.cisco.com/public/sw-license-agreement.html</A>,<BR>&gt; 
or as otherwise set forth at Cisco.com<BR>&gt; Downloads at <A 
href="http://www.cisco.com/public/sw-center/sw-usingswc.shtml">http://www.cisco.com/public/sw-center/sw-usingswc.shtml</A><BR>&gt;<BR>&gt; 
Workarounds<BR>&gt; ===========<BR>&gt;<BR>&gt; It is recommended to change to a 
strong password for all accounts<BR>&gt; created by Cisco Unity.<BR>&gt;<BR>&gt; 
The accounts that are created automatically when Cisco Unity is<BR>&gt; 
integrated with Microsoft Exchange are: (replacing &lt;servername&gt; 
with<BR>&gt; that of the particular Unity server, and &lt;systemid&gt; with that 
of your<BR>&gt; particular system id)<BR>&gt;<BR>&gt; 
EAdmin&lt;systemid&gt;<BR>&gt; Unity_&lt;servername&gt;<BR>&gt; 
UAMIS_&lt;servername&gt;<BR>&gt; UOMNI_&lt;servername&gt;<BR>&gt; 
UVPIM_&lt;servername&gt;<BR>&gt; ESubscriber<BR>&gt;<BR>&gt; Note: Please note 
that the account ESubscriber is only created during<BR>&gt; installation of 
versions PRIOR to version 4.0(3). If your initial<BR>&gt; installation of Unity 
was 4.0(3) or later, Esubscriber will not be<BR>&gt; present.<BR>&gt;<BR>&gt; 
See<BR>&gt; <A 
href="http://cisco.com/en/US/products/sw/voicesw/ps2237/">http://cisco.com/en/US/products/sw/voicesw/ps2237/</A><BR>&gt; 
products_tech_note0918<BR>&gt; 6a0080093f54.shtml<BR>&gt; for additional 
information on how to change account passwords.<BR>&gt;<BR>&gt; For guidance on 
strong passwords, please refer to your security policy.<BR>&gt;<BR>&gt; The CERT 
Coordination Center also has suggestions on strong password<BR>&gt; policy 
at<BR>&gt; <A 
href="http://www.cert.org/tech_tips/unix_configuration_guidelines.html#A">http://www.cert.org/tech_tips/unix_configuration_guidelines.html#A</A><BR>&gt;<BR>&gt; 
Optionally, a customer may disable (but not delete), these specific<BR>&gt; 
accounts for extra security. Beginning with version 4.0(5) of Cisco<BR>&gt; 
Unity, these specific accounts will be created in a disabled state. For<BR>&gt; 
additional instructions on how to disable these accounts, please see<BR>&gt; <A 
href="http://www.microsoft.com/windows2000/en/advanced/help/default.asp">http://www.microsoft.com/windows2000/en/advanced/help/default.asp</A>?<BR>&gt; 
url=/w<BR>&gt; 
indows2000/en/advanced/help/dsadmin_disable_andenable_accounts.htm<BR>&gt;<BR>&gt;<BR>&gt; 
With the exception of ESubscriber, it is important to NOT delete any of<BR>&gt; 
the accounts listed above. Deletion of EAdmin&lt;systemid&gt;,<BR>&gt; 
Unity_&lt;servername&gt;,<BR>&gt; UAMIS_&lt;servername&gt;, 
UOMIN_&lt;server&gt;, or UPVIM_&lt;servername&gt; will have an<BR>&gt; adverse 
affect on Cisco Unity operation.<BR>&gt;<BR>&gt; No interruption of service, nor 
restart of Cisco Unity is required to<BR>&gt; apply this 
workarouund.<BR>&gt;<BR>&gt; Exploitation and Public Announcements<BR>&gt; 
=====================================<BR>&gt;<BR>&gt; The Cisco PSIRT is not 
aware of any public announcements or malicious<BR>&gt; use of the vulnerability 
described in this advisory.<BR>&gt;<BR>&gt; This vulnerability was discovered 
during internal Cisco security<BR>&gt; review.<BR>&gt;<BR>&gt; Status of This 
Notice: FINAL<BR>&gt; ============================<BR>&gt;<BR>&gt; THIS ADVISORY 
IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY<BR>&gt; KIND OF GUARANTEE 
OR WARRANTY. YOUR USE OF THE INFORMATION ON THE<BR>&gt; ADVISORY OR MATERIALS 
LINKED FROM THE ADVISORY IS AT YOUR OWN RISK.<BR>&gt; CISCO RESERVES THE RIGHT 
TO CHANGE OR UPDATE THIS NOTICE AT ANY TIME.<BR>&gt;<BR>&gt; 
Distribution<BR>&gt; ============<BR>&gt;<BR>&gt; This advisory will be posted 
on Cisco's worldwide website at<BR>&gt; <A 
href="http://www.cisco.com/warp/public/707/cisco-sa-20041215-unity.shtml">http://www.cisco.com/warp/public/707/cisco-sa-20041215-unity.shtml</A><BR>&gt;<BR>&gt; 
In addition to worldwide web posting, a text version of this notice is<BR>&gt; 
clear-signed with the Cisco PSIRT PGP key and is posted to the<BR>&gt; following 
e-mail and Usenet news recipients.<BR>&gt;<BR>&gt;&nbsp;&nbsp; * 
cust-security-announce@cisco.com<BR>&gt;&nbsp;&nbsp; * first-teams@first.org 
(includes CERT/CC)<BR>&gt;&nbsp;&nbsp; * 
bugtraq@securityfocus.com<BR>&gt;&nbsp;&nbsp; * 
vulnwatch@vulnwatch.org<BR>&gt;&nbsp;&nbsp; * 
cisco@spot.colorado.edu<BR>&gt;&nbsp;&nbsp; * 
cisco-nsp@puck.nether.net<BR>&gt;&nbsp;&nbsp; * 
full-disclosure@lists.netsys.com<BR>&gt;&nbsp;&nbsp; * 
comp.dcom.sys.cisco@newsgate.cisco.com<BR>&gt;<BR>&gt; Future updates of this 
advisory, if any, will be placed on Cisco's<BR>&gt; worldwide website, but may 
or may not be actively announced on mailing<BR>&gt; lists or newsgroups. Users 
concerned about this problem are encouraged<BR>&gt; to check the above URL for 
any updates.<BR>&gt;<BR>&gt; Revision History<BR>&gt; 
================<BR>&gt;<BR>&gt; 
+----------------------------------------+<BR>&gt; | Revision 
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
| Initial&nbsp; |<BR>&gt; | 1.0&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; | 2004-December-15 
| public&nbsp;&nbsp; |<BR>&gt; 
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
| release. |<BR>&gt; +----------------------------------------+<BR>&gt;<BR>&gt; 
Cisco Security Procedures<BR>&gt; =========================<BR>&gt;<BR>&gt; 
Complete information on reporting security vulnerabilities in Cisco<BR>&gt; 
products, obtaining assistance with security incidents, and registering<BR>&gt; 
to receive security information from Cisco, is available on Cisco's<BR>&gt; 
worldwide website at<BR>&gt; <A 
href="http://www.cisco.com/en/US/products/">http://www.cisco.com/en/US/products/</A><BR>&gt; 
products_security_vulnerability_poli<BR>&gt; cy.html.<BR>&gt; This includes 
instructions for press inquiries regarding Cisco security<BR>&gt; notices. All 
Cisco security advisories are available at<BR>&gt; <A 
href="http://www.cisco.com/go/psirt">http://www.cisco.com/go/psirt</A>.<BR>&gt;<BR>&gt; 
+----------------------------------------------------------------------<BR>&gt; 
-----BEGIN PGP SIGNATURE-----<BR>&gt; Version: GnuPG v1.2.3 
(SunOS)<BR>&gt;<BR>&gt; 
iD8DBQFBwHQsezGozzK2tZARAigAAKD8pWNdDUUoqSWRng3Enbx3iWa/NACgvoVZ<BR>&gt; 
6ocoHWF8pvKgoS4bXQDL4IU=<BR>&gt; =RlrU<BR>&gt; -----END PGP 
SIGNATURE-----<BR>&gt; _______________________________________________<BR>&gt; 
cisco-nsp mailing list&nbsp; cisco-nsp@puck.nether.net<BR>&gt; <A 
href="https://puck.nether.net/mailman/listinfo/cisco-nsp">https://puck.nether.net/mailman/listinfo/cisco-nsp</A><BR>&gt; 
archive at <A 
href="http://puck.nether.net/pipermail/cisco-nsp/">http://puck.nether.net/pipermail/cisco-nsp/</A><BR>&gt;<BR>&gt; 
_______________________________________________<BR>&gt; cisco-voip mailing 
list<BR>&gt; cisco-voip@puck.nether.net<BR>&gt; <A 
href="https://puck.nether.net/mailman/listinfo/cisco-voip">https://puck.nether.net/mailman/listinfo/cisco-voip</A><BR>&gt;<BR><BR>_______________________________________________<BR>cisco-voip 
mailing list<BR>cisco-voip@puck.nether.net<BR><A 
href="https://puck.nether.net/mailman/listinfo/cisco-voip">https://puck.nether.net/mailman/listinfo/cisco-voip</A><BR></FONT></P></DIV>

</BODY>
</HTML>