Advisory ID: cisco-sa-20130129-upnp
Last Updated 2013 February 13 22:34 UTC (GMT)
For Public Release 2013 January 29 20:00 UTC (GMT)
Vulnerability Scoring Details
Software Versions and Fixes
Obtaining Fixed Software
Exploitation and Public Announcements
Status of This Notice: Interim
Cisco Security Procedures
Cisco is currently evaluating products for possible exposure to these vulnerabilities. This advisory is available at the following link:
- Cisco TelePresence C Series Endpoints
- Cisco TelePresence System EX Series
- Cisco TelePresence SX20
- Cisco TelePresence EC20
- Cisco Telepresence Touch Devices
The Cisco ASA Series Adaptive Security Appliance and the Firewall Services Modules (FWSM) do not use libupnp and are not affected.
This section will be updated when more information is available.
The Portable SDK for UPnP Devices is affected by at least three remotely exploitable buffer overflows. These vulnerabilities can be exploited in the processing of incoming SSDP requests on UDP port 1900. CERT released the following CVE IDs to document these vulnerabilities: CVE-2012-5958, CVE-2012-5959, CVE-2012-5960, CVE-2012-5961, CVE-2012-5962, CVE-2012-5963, CVE-2012-5964, and CVE-2012-5965.
The following Cisco bug IDs are being used to track potential exposure to the UPnP issues. The bugs listed below do not confirm that a product is vulnerable, but rather that the product is under investigation by the appropriate product teams.
Registered Cisco customers can view these bugs via the Cisco Bug Toolkit: http://www.cisco.com/pcgi-bin/Support/Bugtool/launch_bugtool.pl
|Cisco AP541N Wireless Access Point||CSCue19294|
|Cisco NSS300 Series Smart Storage**||CSCue19395|
|Cisco PVC2300 Business Internet Video Camera**||CSCue21009|
|Cisco RV0XX Series Routers**||CSCue20980|
|Cisco RV220W Wireless Network Security Firewall||CSCue20983|
|Cisco RV120W Wireless-N VPN Firewall||CSCue20983|
|Cisco RVL200 VPN Router**||CSCue20989|
|Cisco RVS4000 Gigabit Security Router**||CSCue20997|
|Cisco Small Business ISA500 Series Integrated Security Appliances||CSCue19341|
|Cisco Small Business SA500 Series Security Appliances||CSCue21031|
|Cisco TelePresence C Series Endpoints||CSCue19318|
|Cisco TelePresence System EX Series||CSCue19318|
|Cisco TelePresence SX20||CSCue19318|
|Cisco WAP4400N Wireless-N Access Point||CSCue21567|
|Cisco WET200 Wireless-G Business Ethernet Bridge||CSCue21572|
|Cisco WRVS4400N Wireless-N Gigabit Security Router**||CSCue21578|
|Cisco WRV200 Wireless-G VPN Router**||CSCue21578|
**NOTE: This product is no longer being sold and might not be supported.
View the NSS3000 End-of-Life Notice at http://www.cisco.com/en/US/prod/collateral/ps4159/ps9954/ps9957/end_of_life_c51_606545.html.
View the PVC2300 End-of-Life Notice at http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6918/ps9692/ps9944/end_of_life_notice_c51-685005.html.
View the RV Series Routers End-of-Life Notices at http://www.cisco.com/en/US/products/ps9923/prod_eol_notices_list.html
Cisco has scored the vulnerabilities in this advisory based on the Common Vulnerability Scoring System (CVSS). The CVSS scoring in this security advisory is in accordance with CVSS version 2.0.
CVSS is a standards-based scoring method that conveys vulnerability severity and helps organizations determine the urgency and priority of a response.
Cisco has provided a base and temporal score. Customers can also compute environmental scores that help determine the impact of the vulnerabilities in their own networks.Cisco has provided additional information regarding CVSS at the following link:
Cisco has also provided a CVSS calculator to compute the environmental impact for individual networks at the following link:
Portable SDK for UPnP Devices Buffer Overflow Vulnerability
Calculate the environmental score of CSCue21031
CVSS Base Score - 10.0
CVSS Temporal Score - 9.0
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Customers should follow basic hardening rules when configuring wireless devices, such as not allowing "Guest" access and requiring authentication credentials to login.
Customers can also block traffic from untrusted hosts on UDP port 1900 to affected devices using infrastructure access control lists (iACLs). This protection mechanism filters and drops packets that are attempting to exploit these vulnerabilities.
Effective exploit prevention can also be provided by the Cisco ASA 5500 Series Adaptive Security Appliance and the Firewall Services Module (FWSM) for Cisco Catalyst 6500 Series switches and Cisco 7600 Series routers using transit access control lists (tACLs).
Cisco has released an Applied Mitigation Bulletin (AMB) that explains how to detect and mitigate potential exploitation of these vulnerabilities. The AMB is available at: http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=28005
When considering software upgrades, also consult http://www.cisco.com/go/psirt and any subsequent advisories to determine exposure and a complete upgrade solution.
Customers may only install and expect support for feature sets they have purchased. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license at http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html.
The effectiveness of any workaround or fix depends on specific customer situations, such as product mix, network topology, traffic behavior, and organizational mission. Because of the variety of affected products and releases, customers should consult their service providers or support organizations to ensure that any applied workaround or fix is the most appropriate in the intended network before it is deployed.
- +1 800 553 2447 (toll free from within North America)
- +1 408 526 7209 (toll call from anywhere in the world)
- e-mail: firstname.lastname@example.org
Refer to Cisco Worldwide Contacts at http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html for additional TAC contact information, including localized telephone numbers, instructions, and e-mail addresses for support in various languages.
This vulnerability was discovered by HD Moore and reported to Cisco by JP-CERT and US-CERT.
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE.
A stand-alone copy or Paraphrase of the text of this document that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors.
This advisory is posted on Cisco Security at the following link:
Additionally, a text version of this advisory is clear signed with the Cisco PSIRT PGP key and circulated among the following e-mail addresses:
Future updates of this advisory, if any, will reside on Cisco.com but may not be announced on mailing lists. Users can monitor this advisory's URL for any updates.
|Revision 1.2||2013-February-13||Added Confirmed Products to Affected list and added EOS/EOL notice for RV Series Routers.|
|Revision 1.1||2013-January-30||Added a link to the Cisco Applied Mitigation Bulletin.|
|Revision 1.0||2013-January-29||Initial public release.|
Complete information about reporting security vulnerabilities in Cisco products, obtaining assistance with security incidents, and registering to receive security information from Cisco is available on Cisco.com at http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html. This web page includes instructions for press inquiries regarding Cisco Security Advisories. All Cisco Security Advisories are available at http://www.cisco.com/go/psirt.