ID

VAR-200605-0001


CVE

CVE-2006-0561


TITLE

Windows for Cisco Secure Access Control Server Password cracking vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2006-003863

DESCRIPTION

Cisco Secure Access Control Server (ACS) 3.x for Windows stores ACS administrator passwords and the master key in the registry with insecure permissions, which allows local users and remote administrators to decrypt the passwords by using Microsoft's cryptographic API functions to obtain the plaintext version of the master key. Cisco Secure ACS is susceptible to an insecure password-storage vulnerability. This issue is due to a failure of the application to properly secure sensitive password information. This issue allows attackers to gain access to encrypted passwords and to the key used to encrypt them. This allows them to obtain the plaintext passwords, aiding them in attacking other services that depend on the ACS server for authentication. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Symantec Vulnerability Research https://www.symantec.com/research Security Advisory Advisory ID : SYMSA-2006-003 Advisory Title: Cisco Secure ACS for Windows - Administrator Password Disclosure Author : Andreas Junestam Release Date : 05-08-2006 Application : Cisco Secure ACS 3.x for Windows Platform : Microsoft Windows Severity : System access / exploit available Vendor status : Vendor verified, workaround available CVE Number : CVE-2006-0561 Reference : http://www.securityfocus.com/bid/16743 Overview: Cisco Secure ACS is a central administration platform for Cisco network devices. It controls authentication and authorization for enrolled devices. Administrative passwords for locally-defined users are stored in such a way they can be obtained from the Windows registry. If remote registry access is enabled, this can be done over the network. The passwords are encrypted using the Crypto API Microsoft Base Cryptographic Provider v1.0. This information can easily be obtained locally by a Windows administrator, and if remote registry access is enabled, it can be obtained over the network. With this, the clear-text passwords can be recovered by decrypting the information in the registry with the supplied key. A locally generated master key is used to encrypt/decrypt the ACS administrator passwords. The master key is also stored in the Windows registry in an encrypted format. One feature of Windows operating systems is the ability to modify the permissions of a registry key to remove access even for local or domain administrators. The following registry key and all of its sub-keys need to be protected. HKEY_LOCAL_MACHINE\SOFTWARE\Cisco\CiscoAAAv3.3\CSAdmin\Administrators Note: The "CiscoAAAv3.3" portion of the registry key path may differ slightly depending on the version of Cisco Secure ACS for Windows that is installed. The Windows users that need permissions to the registry key will depend on the deployment type. For information about editing the Windows registry, please consult the following Microsoft documentation. For information on restricting remote registry access, please consult the following Microsoft documentation. "How to restrict access to the registry from a remote computer" http://support.microsoft.com/kb/q153183 "How to Manage Remote Access to the Registry" http://support.microsoft.com/kb/q314837 Recommendation: Follow your organization's testing procedures before applying patches or workarounds. See Cisco's instructions on how to place an ACL on the Registry Key, and also how to restrict remote access to the Windows registry. These recommendations do not eliminate the vulnerability, but provide some mitigation. Common Vulnerabilities and Exposures (CVE) Information: The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. CVE-2006-0561 - -------Symantec Vulnerability Research Advisory Information------- For questions about this advisory, or to report an error: research@symantec.com For details on Symantec's Vulnerability Reporting Policy: http://www.symantec.com/research/Symantec-Responsible-Disclosure.pdf Symantec Vulnerability Research Advisory Archive: http://www.symantec.com/research/ Symantec Vulnerability Research PGP Key: http://www.symantec.com/research/Symantec_Vulnerability_Research_PGP.asc - -------------Symantec Product Advisory Information------------- To Report a Security Vulnerability in a Symantec Product: secure@symantec.com For general information on Symantec's Product Vulnerability reporting and response: http://www.symantec.com/security/ Symantec Product Advisory Archive: http://www.symantec.com/avcenter/security/SymantecAdvisories.html Symantec Product Advisory PGP Key: http://www.symantec.com/security/Symantec-Vulnerability-Management-Key.asc - --------------------------------------------------------------- Copyright (c) 2006 by Symantec Corp. Permission to redistribute this alert electronically is granted as long as it is not edited in any way unless authorized by Symantec Consulting Services. Reprinting the whole or part of this alert in any medium other than electronically requires permission from cs_advisories@symantec.com. Disclaimer The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. Symantec, Symantec products, and Symantec Consulting Services are registered trademarks of Symantec Corp. and/or affiliated companies in the United States and other countries. All other registered and unregistered trademarks represented in this document are the sole property of their respective companies/owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFEXR5muk7IIFI45IARArK+AJwOzswbkJN2WirzNweklR+iBBHpsQCgyNOe vKVo3Si7ycswRs/2kiA997I= =dkX3 -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2006-0561 // JVNDB: JVNDB-2006-003863 // BID: 16743 // VULHUB: VHN-16669 // PACKETSTORM: 46315

AFFECTED PRODUCTS

vendor:ciscomodel:secure access control serverscope:eqversion:3.3

Trust: 1.9

vendor:ciscomodel:secure access control serverscope:eqversion:3.2

Trust: 1.9

vendor:ciscomodel:secure access control serverscope:eqversion:3.1

Trust: 1.9

vendor:ciscomodel:secure access control serverscope:eqversion:3.0

Trust: 1.9

vendor:ciscomodel:secure access control serverscope:eqversion:3.1.1

Trust: 1.6

vendor:ciscomodel:secure access control serverscope:eqversion:3.0.1

Trust: 1.6

vendor:ciscomodel:secure access control serverscope:eqversion:3.0.3

Trust: 1.6

vendor:ciscomodel:secure access control serverscope:eqversion:3.x (windows)

Trust: 0.8

vendor:ciscomodel:secure acs for windows serverscope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.1.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.3.2

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.3.1

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.3(1)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2.2

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2.1

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2(3)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2(2)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2(1.20)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:eqversion:3.2(1)

Trust: 0.3

vendor:ciscomodel:secure access control serverscope: - version: -

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:neversion: -

Trust: 0.3

vendor:ciscomodel:secure access control serverscope:neversion:4.0.1

Trust: 0.3

sources: BID: 16743 // JVNDB: JVNDB-2006-003863 // CNNVD: CNNVD-200605-133 // NVD: CVE-2006-0561

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-0561
value: HIGH

Trust: 1.0

NVD: CVE-2006-0561
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200605-133
value: HIGH

Trust: 0.6

VULHUB: VHN-16669
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-0561
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-16669
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-16669 // JVNDB: JVNDB-2006-003863 // CNNVD: CNNVD-200605-133 // NVD: CVE-2006-0561

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-0561

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-200605-133

TYPE

Design Error

Trust: 0.9

sources: BID: 16743 // CNNVD: CNNVD-200605-133

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-003863

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-16669

PATCH

title:SYMSA-2006-003.txturl:http://www.symantec.com/enterprise/research/SYMSA-2006-003.txt

Trust: 0.8

title:16743url:http://www.securityfocus.com/bid/16743

Trust: 0.8

title:threadedurl:http://www.securityfocus.com/archive/1/433301/100/0/threaded

Trust: 0.8

title:cisco-sr-20060508-acs.shtmlurl:http://www.cisco.com/warp/public/707/cisco-sr-20060508-acs.shtml

Trust: 0.8

title:id?1016042url:http://securitytracker.com/id?1016042

Trust: 0.8

sources: JVNDB: JVNDB-2006-003863

EXTERNAL IDS

db:NVDid:CVE-2006-0561

Trust: 2.9

db:BIDid:16743

Trust: 2.1

db:SECTRACKid:1016042

Trust: 1.7

db:OSVDBid:25892

Trust: 1.7

db:VUPENid:ADV-2006-1741

Trust: 1.7

db:JVNDBid:JVNDB-2006-003863

Trust: 0.8

db:CNNVDid:CNNVD-200605-133

Trust: 0.7

db:CISCOid:20060508 RESPONSE TO SYMANTEC SYMSA-2006-003 CISCO SECURE ACS FOR WINDOWS - ADMINISTRATOR PASSWORD DISCLOSURE

Trust: 0.6

db:XFid:26307

Trust: 0.6

db:BUGTRAQid:20060508 RE: SYMSA-2006-003: CISCO SECURE ACS FOR WINDOWS - ADMINISTRATOR PASSWORD DISCLOSURE

Trust: 0.6

db:BUGTRAQid:20060508 SYMSA-2006-003: CISCO SECURE ACS FOR WINDOWS - ADMINISTRATOR PASSWORD DISCLOSURE

Trust: 0.6

db:PACKETSTORMid:46315

Trust: 0.2

db:VULHUBid:VHN-16669

Trust: 0.1

sources: VULHUB: VHN-16669 // BID: 16743 // JVNDB: JVNDB-2006-003863 // PACKETSTORM: 46315 // CNNVD: CNNVD-200605-133 // NVD: CVE-2006-0561

REFERENCES

url:http://www.securityfocus.com/bid/16743

Trust: 1.8

url:http://www.securityfocus.com/archive/1/433301/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/433286/100/0/threaded

Trust: 1.7

url:http://www.cisco.com/warp/public/707/cisco-sr-20060508-acs.shtml

Trust: 1.7

url:http://www.symantec.com/enterprise/research/symsa-2006-003.txt

Trust: 1.7

url:http://www.osvdb.org/25892

Trust: 1.7

url:http://securitytracker.com/id?1016042

Trust: 1.7

url:http://www.vupen.com/english/advisories/2006/1741

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/26307

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-0561

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-0561

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/1741

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/26307

Trust: 0.6

url:http://www.cisco.com/en/us/products/sw/secursw/ps2086/index.html

Trust: 0.3

url:/archive/1/433301

Trust: 0.3

url:/archive/1/433679

Trust: 0.3

url:/archive/1/433286

Trust: 0.3

url:https://www.symantec.com/research

Trust: 0.1

url:http://cve.mitre.org),

Trust: 0.1

url:http://www.symantec.com/research/symantec-responsible-disclosure.pdf

Trust: 0.1

url:http://www.symantec.com/research/

Trust: 0.1

url:http://support.microsoft.com/default.aspx?scid=kb;en-us;256986

Trust: 0.1

url:http://www.symantec.com/research/symantec_vulnerability_research_pgp.asc

Trust: 0.1

url:http://www.symantec.com/avcenter/security/symantecadvisories.html

Trust: 0.1

url:http://support.microsoft.com/kb/q153183

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-0561

Trust: 0.1

url:http://www.symantec.com/security/

Trust: 0.1

url:http://www.symantec.com/security/symantec-vulnerability-management-key.asc

Trust: 0.1

url:http://support.microsoft.com/kb/q314837

Trust: 0.1

sources: VULHUB: VHN-16669 // BID: 16743 // JVNDB: JVNDB-2006-003863 // PACKETSTORM: 46315 // CNNVD: CNNVD-200605-133 // NVD: CVE-2006-0561

CREDITS

Andreas Junestam andreas@atstake.com

Trust: 0.6

sources: CNNVD: CNNVD-200605-133

SOURCES

db:VULHUBid:VHN-16669
db:BIDid:16743
db:JVNDBid:JVNDB-2006-003863
db:PACKETSTORMid:46315
db:CNNVDid:CNNVD-200605-133
db:NVDid:CVE-2006-0561

LAST UPDATE DATE

2024-08-14T14:00:21.344000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-16669date:2017-07-20T00:00:00
db:BIDid:16743date:2006-05-15T19:54:00
db:JVNDBid:JVNDB-2006-003863date:2014-03-11T00:00:00
db:CNNVDid:CNNVD-200605-133date:2006-05-10T00:00:00
db:NVDid:CVE-2006-0561date:2017-07-20T01:29:52.737

SOURCES RELEASE DATE

db:VULHUBid:VHN-16669date:2006-05-10T00:00:00
db:BIDid:16743date:2006-05-08T00:00:00
db:JVNDBid:JVNDB-2006-003863date:2014-03-11T00:00:00
db:PACKETSTORMid:46315date:2006-05-17T06:59:28
db:CNNVDid:CNNVD-200605-133date:2006-05-09T00:00:00
db:NVDid:CVE-2006-0561date:2006-05-10T02:14:00