«
Expand/Collapse
203 items tagged "cisco"
Related tags:
session initiation protocol [+],
protocol sip [+],
directory traversal [+],
remote [+],
web [+],
set [+],
series [+],
security [+],
secure [+],
mobility [+],
meetingplace [+],
denial [+],
client [+],
cisco telepresence [+],
cisco security [+],
cisco dpc [+],
cisco anyconnect [+],
advisory [+],
txt [+],
site [+],
media [+],
execution [+],
cross [+],
communications [+],
command [+],
cisco warns [+],
cisco wag [+],
cisco linksys [+],
buffer overflow vulnerability [+],
talk [+],
digital [+],
command execution [+],
bypass [+],
bugtraq [+],
asa [+],
web management [+],
videoconferencing [+],
unified communications [+],
tom cross [+],
tar gz [+],
tar [+],
security perspective [+],
operations manager [+],
operations [+],
ios [+],
intercept technology [+],
intercept [+],
information disclosure vulnerability [+],
exploits [+],
escalation [+],
disclosure [+],
day [+],
cve [+],
core architecture [+],
content [+],
code execution [+],
cisco security advisory [+],
arbitrary code execution [+],
vulnerability [+],
wrt [+],
wrf [+],
whitepaper [+],
web conferencing [+],
usa [+],
switches [+],
srp [+],
sql [+],
shellcodes [+],
server [+],
security appliances [+],
router [+],
root filesystem [+],
privilege escalation vulnerability [+],
port 8080 [+],
poc [+],
nx os [+],
ngs [+],
newsroom [+],
memory corruption [+],
manager xss [+],
management interface [+],
linksys wrt54g [+],
linksys [+],
injection [+],
guarding [+],
gateway [+],
g broadband [+],
flaw [+],
directory [+],
credentials [+],
control [+],
conferencing [+],
com [+],
cisco webex [+],
cisco vpn [+],
cisco small [+],
cisco router [+],
cisco event [+],
business [+],
black hat [+],
backdoors [+],
advertisement [+],
adaptive security [+],
activex [+],
wireless lan [+],
webex [+],
webapps [+],
web server module [+],
web conference [+],
warranty [+],
vpn concentrator [+],
vpn client [+],
vpn [+],
translation [+],
tracer [+],
telepresence [+],
tcp packet [+],
sql injection [+],
security flaws [+],
rsa [+],
protocol [+],
presentation [+],
playerpt [+],
phone [+],
password [+],
notification [+],
nexus [+],
network address translation [+],
network [+],
memory [+],
manager sccp [+],
manager denial [+],
management [+],
lan controller [+],
juniper [+],
implementation group [+],
hackers [+],
groupname [+],
free software updates [+],
firewall [+],
exploitation [+],
evil [+],
enumeration [+],
endpoint [+],
emc smarts [+],
dll [+],
discs [+],
desktop [+],
cucmsip [+],
cucm [+],
csrf [+],
content services [+],
conference [+],
concentrator [+],
communications manager [+],
common services [+],
common [+],
code [+],
client certificate [+],
ciscoworks [+],
cisco unified meetingplace [+],
cisco phones [+],
cisco patches [+],
cisco packet tracer [+],
cisco packet [+],
cisco nx os [+],
cisco nexus [+],
cisco ipsec [+],
cisco css [+],
bypassing [+],
buffer overflow [+],
blackhat [+],
application [+],
appliances [+],
address [+],
ace [+],
a cisco ios [+],
Wireless [+],
denial of service [+],
xss [+],
wrvs [+],
wrv [+],
windows [+],
web applications [+],
wag [+],
vpn implementation [+],
vipr [+],
videoconferencing products [+],
video [+],
users [+],
update [+],
type [+],
turn [+],
trial [+],
tls [+],
threat intelligence [+],
threat [+],
tftp server [+],
temporary file [+],
technical [+],
target [+],
system [+],
switch focus [+],
switch [+],
surveillance network [+],
surrender control [+],
stealing [+],
ssh [+],
spoofing [+],
source code [+],
software security [+],
softswitch [+],
sms text message [+],
slides [+],
sip [+],
sessions [+],
security weaknesses [+],
security vulnerabilities [+],
security researchers [+],
security agent [+],
security advisories [+],
secure desktop [+],
secunia [+],
section [+],
scraps [+],
rvs [+],
routing system [+],
routing [+],
retired [+],
researchers [+],
research [+],
reputation [+],
remote security [+],
recording [+],
prime data [+],
prime [+],
policy security [+],
plugs [+],
player [+],
phishers [+],
pgw [+],
perspective [+],
penetration [+],
pdf [+],
pc. [+],
patches [+],
patch plugs [+],
patch [+],
packet [+],
number [+],
null pointer [+],
nsense [+],
mpls [+],
media experience [+],
major vulnerabilities [+],
mac [+],
loginpage [+],
local [+],
link [+],
lan [+],
kit [+],
jonathan rosenberg [+],
jhtml [+],
javascript [+],
japan [+],
ironport [+],
ipv [+],
intelligence [+],
information [+],
immersive [+],
identity [+],
huawei [+],
http [+],
host device [+],
hijacking [+],
highly [+],
here [+],
hacker [+],
gateway service [+],
format [+],
forgery [+],
focus [+],
flaws [+],
file format [+],
file [+],
experience engine [+],
experience [+],
enraged [+],
engine database [+],
engine [+],
eavesdrop [+],
dpc [+],
down [+],
dos vulnerability [+],
dos [+],
disaster [+],
denies [+],
denial of service dos [+],
demo cisco wi [+],
demo [+],
data [+],
cvp hackersperspective [+],
css [+],
critical systems [+],
critical [+],
creation vulnerability [+],
corruption [+],
contact center [+],
contact [+],
communicator [+],
collaboration server [+],
client privilege [+],
cisco voip [+],
cisco to [+],
cisco tftp [+],
cisco source [+],
cisco shoots [+],
cisco secure [+],
cisco rvs [+],
cisco reconfigures [+],
cisco pgw [+],
cisco patch [+],
cisco ime [+],
cisco fixes [+],
cisco collaboration [+],
cisco carrier [+],
cisco bugs [+],
building [+],
bugging devices [+],
biannual [+],
authors [+],
authentication [+],
audio [+],
apple server [+],
and [+],
agent software [+],
activex control [+],
access control [+],
Software [+],
IPv6 [+],
vulnerabilities [+],
unified [+],
safer use [+],
service vulnerability [+],
manager [+],
cisco ios [+],
multiple [+],
regular expressions [+],
ctm [+],
cisco unified [+],
cisco template [+],
service [+],
cisco unified communications manager [+]
-
-
16:00
»
SecuriTeam
Cisco Unified MeetingPlace Web Conferencing is prone to a buffer overflow vulnerability.
-
-
16:00
»
SecuriTeam
Cisco WAG120N is prone to multiple remote command-execution vulnerabilities.
-
-
16:00
»
SecuriTeam
Cisco Unified MeetingPlace is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability.
-
-
15:44
»
Packet Storm Security Recent Files
This is a presentation called Router Exploitation. It was given at BlackHat 2009. It discusses various vendors such as Cisco, Juniper, Huawei, and more.
-
15:44
»
Packet Storm Security Misc. Files
This is a presentation called Router Exploitation. It was given at BlackHat 2009. It discusses various vendors such as Cisco, Juniper, Huawei, and more.
-
-
16:00
»
SecuriTeam
Cisco Prime Data Center Network Manager is prone to aRemote Command Execution Vulnerability
-
-
16:00
»
SecuriTeam
Cisco Unified MeetingPlace Web Conferencing is prone to a buffer overflow vulnerability.
-
-
17:00
»
SecuriTeam
Cisco WebEx is prone to multiple remote memory-corruption vulnerabilities.
-
-
17:00
»
SecuriTeam
Cisco AnyConnect Secure Mobility Client is prone to multiple security-bypass vulnerabilities.
-
17:00
»
SecuriTeam
Cisco AnyConnect Secure Mobility Client is prone to a security-bypass vulnerability.
-
17:00
»
SecuriTeam
Cisco AnyConnect Secure Mobility Client is prone to a denial-of-service vulnerability
-
17:00
»
SecuriTeam
Cisco Carrier Routing System is prone to a security-bypass vulnerability.
-
17:00
»
SecuriTeam
Cisco IOS is prone to a remote denial-of-service vulnerability..
-
17:00
»
SecuriTeam
Cisco IOS is prone to an information-disclosure vulnerability.
-
17:00
»
SecuriTeam
Cisco IOS is prone to a remote denial-of-service vulnerability.
-
17:00
»
SecuriTeam
Cisco IOS is prone to a remote denial-of-service vulnerability.
-
17:00
»
SecuriTeam
Cisco IP Communicator is prone to a security-bypass vulnerability. .
-
17:00
»
SecuriTeam
Cisco NX-OS is prone to a remote denial-of-service vulnerability.
-
-
17:00
»
SecuriTeam
Cisco TelePresence Immersive Endpoint Devices are prone to a remote command-injection vulnerability.
-
-
17:00
»
SecuriTeam
Cisco Linksys PlayerPT ActiveX Control is prone to a buffer-overflow vulnerability because the application fails to adequately check boundaries on user-supplied input.
-
-
22:20
»
Packet Storm Security Recent Files
Cisco Template Manager (CTM) is a set of tools that make it easy to manage Cisco configurations over a whole network based on your self-defined templates. Templates support regular expressions. It works with the C760x, C730x, C37xx, C35xx, C29xx, C28xx, C18xx, and C17xx series.
-
22:20
»
Packet Storm Security Tools
Cisco Template Manager (CTM) is a set of tools that make it easy to manage Cisco configurations over a whole network based on your self-defined templates. Templates support regular expressions. It works with the C760x, C730x, C37xx, C35xx, C29xx, C28xx, C18xx, and C17xx series.
-
22:20
»
Packet Storm Security Misc. Files
Cisco Template Manager (CTM) is a set of tools that make it easy to manage Cisco configurations over a whole network based on your self-defined templates. Templates support regular expressions. It works with the C760x, C730x, C37xx, C35xx, C29xx, C28xx, C18xx, and C17xx series.
-
-
11:39
»
Packet Storm Security Exploits
Newsroom.cisco.com suffers from a cross site scripting vulnerability. The author tried to reach Cisco and did not get a response.
-
-
21:42
»
Packet Storm Security Advisories
Cisco Security Advisory - Cisco Small Business (SRP 500) Series Services Ready Platforms contains command injection, unauthenticated configuration upload, and directory traversal vulnerabilities.
-
21:42
»
Packet Storm Security Recent Files
Cisco Security Advisory - Cisco Small Business (SRP 500) Series Services Ready Platforms contains command injection, unauthenticated configuration upload, and directory traversal vulnerabilities.
-
21:42
»
Packet Storm Security Misc. Files
Cisco Security Advisory - Cisco Small Business (SRP 500) Series Services Ready Platforms contains command injection, unauthenticated configuration upload, and directory traversal vulnerabilities.
-
-
19:35
»
Packet Storm Security Misc. Files
Cisco Security Advisory - Cisco NX-OS Software is affected by a denial of service (DoS) vulnerability that could cause Cisco Nexus 1000v, 5000, and 7000 Series Switches that are running affected versions of Cisco NX-OS Software to reload when the IP stack processes a malformed IP packet. Cisco has released free software updates that address this vulnerability.
-
-
15:54
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Unified Service Monitor due to bundled EMC SMARTS application server.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
15:49
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco Unified Service Monitor due to bundled EMC SMARTS application server.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
14:24
»
Packet Storm Security Recent Files
Cisco Template Manager (CTM) is a set of tools that make it easy to manage Cisco configurations over a whole network based on your self-defined templates. Templates support regular expressions. It works with the C760x, C730x, C37xx, C35xx, C29xx, C28xx, C18xx, and C17xx series.
-
14:24
»
Packet Storm Security Tools
Cisco Template Manager (CTM) is a set of tools that make it easy to manage Cisco configurations over a whole network based on your self-defined templates. Templates support regular expressions. It works with the C760x, C730x, C37xx, C35xx, C29xx, C28xx, C18xx, and C17xx series.
-
14:24
»
Packet Storm Security Misc. Files
Cisco Template Manager (CTM) is a set of tools that make it easy to manage Cisco configurations over a whole network based on your self-defined templates. Templates support regular expressions. It works with the C760x, C730x, C37xx, C35xx, C29xx, C28xx, C18xx, and C17xx series.
-
-
15:49
»
SecuriTeam
Multiple vulnerabilities were discovered in Cisco AnyConnect Secure Mobility Client.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
7:46
»
Packet Storm Security Advisories
The default deployment of Cisco Unified Contact Center Express (UCCX) system is configured with multiple listening services. The web service that is listening on TCP port 9080, or on TCP port 8080 in versions prior to 8.0(x), serves a directory which is configured in a way that allows for a remote unauthenticated attacker to retrieve arbitrary files from the UCCX root filesystem through a directory traversal attack. It is possible for an attacker to use this vector to gain console access to the vulnerable node as the 'ccxcluster' user, and subsequently escalate privileges.
-
7:46
»
Packet Storm Security Recent Files
The default deployment of Cisco Unified Contact Center Express (UCCX) system is configured with multiple listening services. The web service that is listening on TCP port 9080, or on TCP port 8080 in versions prior to 8.0(x), serves a directory which is configured in a way that allows for a remote unauthenticated attacker to retrieve arbitrary files from the UCCX root filesystem through a directory traversal attack. It is possible for an attacker to use this vector to gain console access to the vulnerable node as the 'ccxcluster' user, and subsequently escalate privileges.
-
7:46
»
Packet Storm Security Misc. Files
The default deployment of Cisco Unified Contact Center Express (UCCX) system is configured with multiple listening services. The web service that is listening on TCP port 9080, or on TCP port 8080 in versions prior to 8.0(x), serves a directory which is configured in a way that allows for a remote unauthenticated attacker to retrieve arbitrary files from the UCCX root filesystem through a directory traversal attack. It is possible for an attacker to use this vector to gain console access to the vulnerable node as the 'ccxcluster' user, and subsequently escalate privileges.
-
-
17:59
»
SecuriTeam
A Default credentials vulnerability was identified in Cisco Media Experience Engine 5600.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
17:09
»
SecuriTeam
Multiple vulnerabilities were discovered in Cisco Unified Communications Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
14:59
»
SecuriTeam
Multiple vulnerabilities exist within the Cisco TelePresence Recording Server.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
14:54
»
SecuriTeam
Multiple vulnerabilities exist in the Cisco TelePresence Manager.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
20:49
»
SecuriTeam
Multiple vulnerabilities exist in the Cisco TelePresence solution.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
20:49
»
SecuriTeam
Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
7:17
»
Packet Storm Security Exploits
Cisco Unified Operations Manager suffers from cross site scripting, remote SQL injection, and directory traversal vulnerabilities. Versions 8.0 and 8.5 are affected.
-
7:17
»
Packet Storm Security Recent Files
Cisco Unified Operations Manager suffers from cross site scripting, remote SQL injection, and directory traversal vulnerabilities. Versions 8.0 and 8.5 are affected.
-
7:17
»
Packet Storm Security Misc. Files
Cisco Unified Operations Manager suffers from cross site scripting, remote SQL injection, and directory traversal vulnerabilities. Versions 8.0 and 8.5 are affected.
-
-
20:14
»
Packet Storm Security Exploits
The Cisco Linksys Wireless G Broadband Router WRT54G with firmware version 4.21.1 suffers from a cross site scripting vulnerability.
-
-
23:45
»
SecuriTeam
A service policy bypass and two Denial of Service vulnerabilities exist in the Cisco Content Services Gateway - Second Generation (CSG2).
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
13:58
»
SecuriTeam
Multiple Vulnerabilities were identified in Cisco Unified Videoconferencing Products.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
15:22
»
Wirevolution
Although phone numbers are an antiquated kind of thing, we are sufficiently beaten down by the machines that we think of it as natural to identify a person by a 10 digit number. Maybe the demise of the numeric phone keypad as big touch-screens take over will change matters on this front. But meanwhile, phone numbers are holding us back in important ways. Because phone numbers are bound to the PSTN, which doesn’t carry video calls, it is harder to make video calls than voice, because we don’t have people’s video addresses so handy.
This year, three new products attempted to address this issue in remarkably similar ways – clearly an idea whose time has come. The products are Apple’s FaceTime, Cisco’s IME and a startup product called Tango.
In all three of these products, you make a call to a regular phone number, which triggers a video session over the Internet. You only need the phone number – the Internet addressing is handled automatically. The two problems the automatic addressing has to handle are finding a candidate address, then verifying that it is the right one. Here’s how each of those three new products does the job:
1. FaceTime. When you first start FaceTime, it sends an SMS (text message) to an Apple server. The SMS contains sufficient information for the Apple server to reliably associate your phone number with the XMPP (push services) client running on your iPhone. With this authentication performed, anybody else who has your phone number in their address book on their iPhone or Mac can place a videophone call to you via FaceTime.
2. Cisco IME (Inter-Company Media Engine). The protocol used by IME to securely associate your phone number with your IP address is ViPR (Verification Involving PSTN Reachability), an open protocol specified in several IETF drafts co-authored by Jonathan Rosenberg who is now at Skype. ViPR can be embodied in a network box like IME, or in an endpoint like a phone of PC.
Here’s how it works: you make a phone call in the usual way. After you hang up, ViPR looks up the phone number you called to see if it is also ViPR-enabled. If it is, ViPR performs a secure mutual verification, by using proof-of-knowledge of the previous PSTN call as a shared secret. The next time you dial that phone number, ViPR makes the call through the Internet rather than through the phone network, so you can do wideband audio and video with no per-minute charge. A major difference between ViPR and FaceTime or Tango is that ViPR does not have a central registration server. The directory that ViPR looks up phone numbers in is stored in a distributed hash table (DHT). This is basically a distributed database with the contents stored across the network. Each ViPR participant contributes a little bit of storage to the network. The DHT itself defines an algorithm – called Chord – which describes how each node connects to other nodes, and how to look up information.
3. Tango, like FaceTime, has its own registration servers. The authentication on these works slightly differently. When you register with Tango, it looks in the address book on your iPhone for other registered Tango users, and displays them in your Tango address book. So if you already know somebody’s phone number, and that person is a registered Tango user, Tango lets you call them in video over the Internet.
-
-
11:10
»
Packet Storm Security Recent Files
Cisco Template Manager (CTM) is a set of tools that make it easy to manage Cisco configurations over a whole network based on your self-defined templates. Templates support regular expressions. It works with the C760x, C730x, C37xx, C35xx, C29xx, C28xx, C18xx, and C17xx series.
-
11:10
»
Packet Storm Security Misc. Files
Cisco Template Manager (CTM) is a set of tools that make it easy to manage Cisco configurations over a whole network based on your self-defined templates. Templates support regular expressions. It works with the C760x, C730x, C37xx, C35xx, C29xx, C28xx, C18xx, and C17xx series.
-
-
14:50
»
SecuriTeam
Cisco Unified Communications Manager contains two denial of service (DoS) vulnerabilities that affect the processing of Session Initiation Protocol (SIP) messages.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
1:00
»
Packet Storm Security Advisories
Cisco Security Advisory - CiscoWorks Common Services for both Oracle Solaris and Microsoft Windows contains a vulnerability that could allow a remote unauthenticated attacker to execute arbitrary code on a host device with privileges of a system administrator. Cisco has released free software updates that address this vulnerability. There are no workarounds that mitigate this vulnerability. Mitigations that limit the attack surface of this vulnerability are available.
-
-
20:03
»
Packet Storm Security Tools
Cisco Template Manager (CTM) is a set of tools that make it easy to manage Cisco configurations over a whole network based on your self-defined templates. Templates support regular expressions. It works with the C760x, C730x, C37xx, C35xx, C29xx, C28xx, C18xx, and C17xx series.
-
-
18:37
»
SecuriTeam
Cisco Unified Communications Manager contains two denial of service vulnerabilities that affect the processing of Session Initiation Protocol (SIP) messages.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
18:37
»
SecuriTeam
Cisco Unified Communications Manager contains two denial of service vulnerabilities that affect the processing of Session Initiation Protocol (SIP) messages.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
23:53
»
SecuriTeam
Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
19:01
»
Packet Storm Security Recent Files
Cisco Security Advisory - Cisco Unified Communications Manager contains two denial of service (DoS) vulnerabilities that affect the processing of Session Initiation Protocol (SIP) messages. Exploitation of these vulnerabilities could cause an interruption of voice services.
-
19:00
»
Packet Storm Security Advisories
Cisco Security Advisory - Cisco Unified Communications Manager contains two denial of service (DoS) vulnerabilities that affect the processing of Session Initiation Protocol (SIP) messages. Exploitation of these vulnerabilities could cause an interruption of voice services.
-
-
23:38
»
Packet Storm Security Recent Files
Cisco Security Advisory - Cisco Unified Communications Manager contains two denial of service (DoS) vulnerabilities that affect the processing of Session Initiation Protocol (SIP) messages. Exploitation of these vulnerabilities could cause an interruption of voice services.
-
23:38
»
Packet Storm Security Advisories
Cisco Security Advisory - Cisco Unified Communications Manager contains two denial of service (DoS) vulnerabilities that affect the processing of Session Initiation Protocol (SIP) messages. Exploitation of these vulnerabilities could cause an interruption of voice services.
-
20:18
»
SecuriTeam
Multiple vulnerabilities were identified in Cisco Unified Contact Center Express.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
20:18
»
SecuriTeam
Multiple Vulnerabilities were identified on Cisco PGW Softswitch.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
21:19
»
SecuriTeam
A vulnerability related to privilege escalation exists in the Cisco Digital Media Manager (DMM).
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
21:04
»
SecDocs
Authors:
Tom Cross Tags:
forensic network Cisco sniffer Event:
Black Hat DC 2010 Abstract: Many governments require telecommunications companies to provide interfaces that law enforcement can use to monitor their customer's communications. If these interfaces are poorly designed, implemented, or managed they can provide a backdoor for attackers to perform surveillance without lawful authorization. Most lawful intercept technology is proprietary and difficult to peer review. Fortunately, Cisco has published the core architecture of it's lawful intercept technology in an Internet Draft and a number of public configuration guides. This talk will review Cisco's architecture for lawful intercept from a security perspective. The talk will explain how a number of different weaknesses in its design coupled with publicly disclosed security vulnerabilities could enable a malicious person to access the interface and spy on communications without leaving a trace. The talk will explain what steps network operators need to take to protect this interface. The talk will also provide a set of recommendations for the redesign of the interface as well as SNMP authentication in general to better mitigate the security risks.
-
21:04
»
SecDocs
Authors:
Tom Cross Tags:
forensic network Cisco sniffer Event:
Black Hat DC 2010 Abstract: Many governments require telecommunications companies to provide interfaces that law enforcement can use to monitor their customer's communications. If these interfaces are poorly designed, implemented, or managed they can provide a backdoor for attackers to perform surveillance without lawful authorization. Most lawful intercept technology is proprietary and difficult to peer review. Fortunately, Cisco has published the core architecture of it's lawful intercept technology in an Internet Draft and a number of public configuration guides. This talk will review Cisco's architecture for lawful intercept from a security perspective. The talk will explain how a number of different weaknesses in its design coupled with publicly disclosed security vulnerabilities could enable a malicious person to access the interface and spy on communications without leaving a trace. The talk will explain what steps network operators need to take to protect this interface. The talk will also provide a set of recommendations for the redesign of the interface as well as SNMP authentication in general to better mitigate the security risks.
-
21:04
»
SecDocs
Authors:
Tom Cross Tags:
forensic network Cisco sniffer Event:
Black Hat DC 2010 Abstract: Many governments require telecommunications companies to provide interfaces that law enforcement can use to monitor their customer's communications. If these interfaces are poorly designed, implemented, or managed they can provide a backdoor for attackers to perform surveillance without lawful authorization. Most lawful intercept technology is proprietary and difficult to peer review. Fortunately, Cisco has published the core architecture of it's lawful intercept technology in an Internet Draft and a number of public configuration guides. This talk will review Cisco's architecture for lawful intercept from a security perspective. The talk will explain how a number of different weaknesses in its design coupled with publicly disclosed security vulnerabilities could enable a malicious person to access the interface and spy on communications without leaving a trace. The talk will explain what steps network operators need to take to protect this interface. The talk will also provide a set of recommendations for the redesign of the interface as well as SNMP authentication in general to better mitigate the security risks.
-
21:04
»
SecDocs
Authors:
Tom Cross Tags:
forensic network Cisco sniffer Event:
Black Hat DC 2010 Abstract: Many governments require telecommunications companies to provide interfaces that law enforcement can use to monitor their customer's communications. If these interfaces are poorly designed, implemented, or managed they can provide a backdoor for attackers to perform surveillance without lawful authorization. Most lawful intercept technology is proprietary and difficult to peer review. Fortunately, Cisco has published the core architecture of it's lawful intercept technology in an Internet Draft and a number of public configuration guides. This talk will review Cisco's architecture for lawful intercept from a security perspective. The talk will explain how a number of different weaknesses in its design coupled with publicly disclosed security vulnerabilities could enable a malicious person to access the interface and spy on communications without leaving a trace. The talk will explain what steps network operators need to take to protect this interface. The talk will also provide a set of recommendations for the redesign of the interface as well as SNMP authentication in general to better mitigate the security risks.
-
-
17:39
»
SecuriTeam
A vulnerability related to privilege escalation exists in the Cisco Digital Media Manager (DMM).
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
16:04
»
SecuriTeam
A vulnerability related to default credentials exists in the Cisco Digital Media Manager (DMM).
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
17:01
»
Packet Storm Security Tools
Cisco Template Manager (CTM) is a set of tools that make it easy to manage Cisco configurations over a whole network based on your self-defined templates. Templates support regular expressions. It works with the C760x, C730x, C37xx, C35xx, C29xx, C28xx, C18xx, and C17xx series.
-
17:01
»
Packet Storm Security Recent Files
Cisco Template Manager (CTM) is a set of tools that make it easy to manage Cisco configurations over a whole network based on your self-defined templates. Templates support regular expressions. It works with the C760x, C730x, C37xx, C35xx, C29xx, C28xx, C18xx, and C17xx series.
-
-
21:07
»
SecuriTeam
Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
19:52
»
Packet Storm Security Tools
Cisco Template Manager (CTM) is a set of tools that make it easy to manage Cisco configurations over a whole network based on your self-defined templates. Templates support regular expressions. It works with the C760x, C730x, C37xx, C35xx, C29xx, C28xx, C18xx, and C17xx series.
-
-
14:00
»
Packet Storm Security Recent Files
Cisco Security Advisory - Cisco Unified Communications Manager (formerly Cisco CallManager) contains multiple denial of service (DoS) vulnerabilities that if exploited could cause an interruption of voice services. The Session Initiation Protocol (SIP), Skinny Client Control Protocol (SCCP) and Computer Telephony Integration (CTI) Manager services are affected by these vulnerabilities.
-
14:00
»
Packet Storm Security Advisories
Cisco Security Advisory - Cisco Unified Communications Manager (formerly Cisco CallManager) contains multiple denial of service (DoS) vulnerabilities that if exploited could cause an interruption of voice services. The Session Initiation Protocol (SIP), Skinny Client Control Protocol (SCCP) and Computer Telephony Integration (CTI) Manager services are affected by these vulnerabilities.