Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Vulnerability Alert

Microsoft Internet Security and Acceleration Server Radius One-Time Password Authentication Bypass Vulnerability

 
Threat Type:CWE-287: Authentication Issues
IntelliShield ID:18612
Version:1
First Published:2009 July 14 18:32 GMT
Last Published:2009 July 14 18:32 GMT
Port: Not available
CVE:CVE-2009-1135
Urgency:Unlikely Use
Credibility:Confirmed
Severity:Moderate Damage
CVSS Base:9.3 CVSS Calculator
CVSS Version 2.0
CVSS Temporal:6.9
 
Version Summary:

Microsoft Internet Security and Acceleration Server contains a vulnerability that could allow an unauthenticated, remote attacker to bypass security restrictions and gain unauthorized access to a vulnerable system.  Updates are available.

 
 
Description

Microsoft Internet Security and Acceleration (ISA) Server 2006 SP1 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to bypass security restrictions and gain unauthorized access to a vulnerable system.

This vulnerability is due to errors when the vulnerable server handles Radius One-Time Password (OTP) authentication requests.  An unauthenticated, remote attacker could exploit this vulnerability by sending a malicious request to the system.  If an exploit is successful, the attacker could gain unauthorized access to restricted resources.

Microsoft has confirmed this vulnerability in a security bulletin and released updated software.

 
Warning Indicators

Microsoft Internet Security and Acceleration Server 2006 SP1 and prior are vulnerable.

 
IntelliShield Analysis

To exploit this vulnerability, an attacker must be able to make authentication attempts to the vulnerable system using the name of an existing administrative account.  The attacker must know the account name before the attack.  The attacker may also require access to internal networks to send the authentication request, which could reduce the potential for exploitation.

If an exploit is successful, the attacker could bypass authentication and access restricted resources.  The attacker could completely compromise systems protected by the ISA Server.

The Cisco Applied Intelligence team has created an Applied Mitigation Bulletin to address vulnerabilities that Microsoft disclosed in the July 2009 security bulletin release. This Cisco bulletin, which assists administrators in identifying or mitigating these vulnerabilities using Cisco devices, is available at the following link: Cisco Applied Mitigation Bulletin: Microsoft Security Bulletin for July 2009

The update available from Microsoft corrects this vulnerability by rejecting authentication requests that cannot be processed by Radius OTP.

 
Vendor Announcements

Microsoft has released a security bulletin at the following link: MS09-031

 
Impact

An unauthenticated, remote attacker could exploit this vulnerability to bypass security restrictions and gain unauthorized access to resources on a vulnerable system.

 
Technical Information

This vulnerability is due to errors when the vulnerable server handles Radius OTP authentication requests.  ISA Server may attempt to authenticate requests using the HTTP Basic authentication method.  The processing of a specifically formed authentication request could be misinterpreted as valid by the application, allowing unauthorized access.  Only systems that use Radius OTP configured to use HTTP Basic authentication as a fallback method are vulnerable to exploitation.

An unauthenticated, remote attacker who knows the account name of an administrative account could exploit this vulnerability by sending a malicious authentication request to the affected system.  The processing of the malicious request could grant the attacker approved access to the application or systems that are protected by the application.  This behavior could give the attacker unauthorized access to protected resources.

 
Safeguards

Administrators are advised to apply the appropriate update.

Administrators are advised to restrict network access to affected systems.

Administrators may consider disabling Basic authentication fallback.

Administrators are advised to monitor critical systems.

 
Patches/Software

Microsoft customers can obtain updates directly by using the links in the security bulletin.  These updates are also distributed by Windows automatic update features and available on the Windows Update website.  Microsoft Windows Server Update Services (WSUS), Systems Management Server, and System Center Configuration Manager can assist administrators in deploying software updates.

 
Alert History
 

Initial Release



Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
Microsoft, Inc.ISA Server 2006 Base, SP1

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield