• US-CERT Warning

    From Ben Ritchey@1:393/68 to All on Wed Nov 11 09:35:38 2015
    NCCIC / US-CERT

    National Cyber Awareness System:

    TA15-314A: Web Shells û Threat Awareness and Guidance
    11/10/2015 08:12 PM EST


    Original release date: November 10, 2015

    Systems Affected
    Web servers that allow web shells

    Overview
    This alert describes the frequent use of web shells as an exploitation vector. Web shells can be used to obtain unauthorized access and can lead to wider network compromise. This alert outlines the threat and provides prevention, detection, and mitigation strategies.

    Consistent use of web shells by Advanced Persistent Threat (APT) and criminal groups has led to significant cyber incidents.

    This product was developed in collaboration with US-CERT partners in the United
    Kingdom, Australia, Canada, and New Zealand based on activity seen targeting organizations across these countries. The detection and mitigation measures outlined in this document represent the shared judgement of all participating agencies.

    Description
    Web Shell Description
    A web shell is a script that can be uploaded to a web server to enable remote administration of the machine. Infected web servers can be either Internet-facing or internal to the network, where the web shell is used to pivot further to internal hosts.

    A web shell can be written in any language that the target web server supports.
    The most commonly observed web shells are written in languages that are widely supported, such as PHP and ASP. Perl, Ruby, Python, and Unix shell scripts are also used.

    Using network reconnaissance tools, an adversary can identify vulnerabilities that can be exploited and result in the installation of a web shell. For example, these vulnerabilities can exist in content management systems (CMS) or
    web server software.

    Once successfully uploaded, an adversary can use the web shell to leverage other exploitation techniques to escalate privileges and to issue commands remotely. These commands are directly linked to the privilege and functionality
    available to the web server and may include the ability to add, delete, and execute files as well as the ability to run shell commands, further executables, or scripts.

    How and why are they used by malicious adversaries?
    Web shells are frequently used in compromises due to the combination of remote access and functionality. Even simple web shells can have a considerable impact
    and often maintain minimal presence.

    Web shells are utilized for the following purposes:

    To harvest and exfiltrate sensitive data and credentials;
    To upload additional malware for the potential of creating, for example, a watering hole for infection and scanning of further victims;
    To use as a relay point to issue commands to hosts inside the network without direct Internet access;
    To use as command-and-control infrastructure, potentially in the form of a bot in a botnet or in support of compromises to additional external networks. This could occur if the adversary intends to maintain long-term persistence.
    While a web shell itself would not normally be used for denial of service (DoS)
    attacks, it can act as a platform for uploading further tools, including DoS capability.

    Examples
    Web shells such as China Chopper, WSO, C99 and B374K are frequently chosen by adversaries; however these are just a small number of known used web shells. (Further information linking to IOCs and SNORT rules can be found in the Additional Resources section).

    China Chopper û A small web shell packed with features. Has several command and
    control features including a password brute force capability.
    WSO û Stands for ôweb shell by orbö and has the ability to masquerade as an error page containing a hidden login form.
    C99 û A version of the WSO shell with additional functionality. Can display the
    serverÆs security measures and contains a self-delete function.
    B374K û PHP based web shell with common functionality such as viewing processes
    and executing commands.
    Delivery Tactics
    Web shells can be delivered through a number of web application exploits or configuration weaknesses including:

    Cross-Site Scripting;
    SQL Injection;
    Vulnerabilities in applications/services (e.g., WordPress or other CMS applications);
    File processing vulnerabilities (e.g., upload filtering or assigned permissions);
    Remote File Include (RFI) and Local File Include (LFI) vulnerabilities;
    Exposed Admin Interfaces (possible areas to find vulnerabilities mentioned above).
    The above tactics can be and are combined regularly. For example, an exposed admin interface also requires a file upload option, or another exploit method mentioned above, to deliver successfully.

    Impact
    A successfully uploaded shell script may allow a remote attacker to bypass security restrictions and gain unauthorized system access.

    Solution
    Prevention and Mitigation
    Installation of a web shell is commonly accomplished through web application vulnerabilities or configuration weaknesses. Therefore, identification and closure of these vulnerabilities is crucial to avoiding potential compromise. The following suggestions specify good security and web shell specific practices:

    Employ regular updates to applications and the host operating system to ensure protection against known vulnerabilities.
    Implement a least-privileges policy on the web server to:
    Reduce adversariesÆ ability to escalate privileges or pivot laterally to other hosts.
    Control creation and execution of files in particular directories.
    If not already present, consider deploying a demilitarized zone (DMZ) between your webfacing systems and the corporate network. Limiting the interaction and logging traffic between the two provides a method to identify possible malicious activity.
    Ensure a secure configuration of web servers. All unnecessary services and ports should be disabled or blocked. All necessary services and ports should be
    restricted where feasible. This can include whitelisting or blocking external access to administration panels and not using default login credentials. Utilize a reverse proxy or alternative service, such as mod_security, to restrict accessible URL paths to known legitimate ones.
    Establish, and backup offline, a ôknown goodö version of the relevant server and a regular change-management policy to enable monitoring for changes to servable content with a file integrity system.
    Employ user input validation to restrict local and remote file inclusion vulnerabilities.
    Conduct regular system and application vulnerability scans to establish areas of risk. While this method does not protect against zero day attacks it will highlight possible areas of concern.
    Deploy a web application firewall and conduct regular virus signature checks, application fuzzing, code reviews and server network analysis.
    Detection
    Due to the potential simplicity and ease of modification of web shells, they can be difficult to detect. For example, anti-virus products sometimes produce poor results in detecting web shells.

    The following may be indicators that your system has been infected by a web shell. Note a number of these indicators are common to legitimate files. Any suspected malicious files should be considered in the context of other indicators and triaged to determine whether further inspection or validation is
    required.

    Abnormal periods of high site usage (due to potential uploading and downloading
    activity);
    Files with an unusual timestamp (e.g., more recent than the last update of the web applications installed);
    Suspicious files in Internet-accessible locations (web root);
    Files containing references to suspicious keywords such as cmd.exe or eval; Unexpected connections in logs. For example:
    A file type generating unexpected or anomalous network traffic (e.g., a JPG file making requests with POST parameters);
    Suspicious logins originating from internal subnets to DMZ servers and vice versa.
    Any evidence of suspicious shell commands, such as directory traversal, by the web server process.
    For investigating many types of shells, a search engine can be very helpful. Often, web shells will be used to spread malware onto a server and the search engines are able to see it. But many web shells check the User-Agent and will display differently for a search engine spider (a program that crawls through links on the Internet, grabbing content from sites and adding it to search engine indexes) than for a regular user. To find a shell, you may need to change your User-Agent to one of the search engine bots. Some browsers have plugins that allow you to easily switch a User-Agent. Once the shell is detected, simply delete the file from the server.

    Client characteristics can also indicate possible web shell activity. For example, the malicious actor will often visit only the URI where the web shell script was created, but a standard user usually loads the webpage from a linked
    page/referrer or loads additional content/resources. Thus, performing frequency
    analysis on the web access logs could indicate the location of a web shell. Most legitimate URI visits will contain varying user-agents, whereas a web shell is generally only visited by the creator, resulting in limited user-agent
    variants.

    References
    Australian Cyber Security Centre û Securing Content Management Systems (CMS) FireEye China Chopper û The Little Malware That Could. Detecting and Defeating the China Chopper Web Shell
    MANDIANT û Old Web Shells New Tricks
    FireEye û Breaking Down the China Chopper Web Shell Part I
    FireEye û Breaking Down the China Chopper Web Shell Part II
    WSO Information
    Exploit-db û China Chopper
    C99
    INFOSEC Institute û Web Shell Detection
    Revision History
    November 10, 2015: Initial Release

    -------------------------------------------------------------------------------
    -

    This product is provided subject to this Notification and this Privacy & Use policy.


    -------------------------------------------------------------------------------
    -
    A copy of this publication is available at www.us-cert.gov. If you need help or
    have questions, please send an email to info@us-cert.gov. Do not reply to this message since this email was sent from a notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT@ncas.us-cert.gov to your address book.
    OTHER RESOURCES:
    Contact Us | Security Publications | Alerts and Tips | Related Resources
    STAY CONNECTED:
    Sign up for email updates

    SUBSCRIBER SERVICES:
    Manage Preferences | Unsubscribe | Help


    -------------------------------------------------------------------------------
    -
    This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf of:
    United States Computer Emergency Readiness Team (US-CERT) ╖ 245 Murray Lane SW Bldg 410 ╖ Washington, DC 20598 ╖ (888) 282-0870 Powered by GovDelivery

    === Cut ===

    --
    Guardien Fide :^)

    Ben aka cMech Web: http://cmech.dynip.com
    Email: fido4cmech(at)lusfiber.net
    Home page: http://cmech.dynip.com/homepage/
    WildCat! Board 24/7 +1-337-984-4794 any BAUD 8,N,1

    --- GoldED+/W32-MSVC
    * Origin: FIDONet - The Positronium Repository (1:393/68)
  • From Ben Ritchey@1:393/68 to All on Tue Sep 6 21:37:24 2016
    From: "US-CERT" <US-CERT@ncas.us-cert.gov>
    To: <Fido4cmech@lusfiber.net>

    Subject: TA16-250A: The Increasing Threat to Network Infrastructure Devices and

    Recommended Mitigations

    Date: Tuesday, September 06, 2016 9:17 PM

    U.S. Department of Homeland Security US-CERT

    National Cyber Awareness System:

    á

    TA16-250A: The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations [ https://www.us-cert.gov/ncas/alerts/TA16-250A ] 09/06/2016 06:29 PM EDT
    Original release date: September 06, 2016

    Systems Affected

    Network Infrastructure Devices
    á

    Overview

    The advancing capabilities of organized hacker groups and cyber adversaries create an increasing global threat to information systems. The rising threat levels place more demands on security personnel and network administrators to protect information systems. Protecting the network infrastructure is critical to preserve the confidentiality, integrity, and availability of communication and services across an enterprise.

    To address threats to network infrastructure devices, this Alert provides information on recent vectors of attack that advanced persistent threat (APT) actors are targeting, along with prevention and mitigation recommendations.
    á

    Description

    Network infrastructure consists of interconnected devices designed to transport

    communications needed for data, applications, services, and multi-media. Routers and firewalls are the focus of this alert; however, many other devices exist in the network, such as switches, load-balancers, intrusion detection systems, etc. Perimeter devices, such as firewalls and intrusion detection systems, have been the traditional technologies used to secure the network, but

    as threats change, so must security strategies. Organizations can no longer rely on perimeter devices to protect the network from cyber intrusions; organizations must also be able to contain the impact/losses within the internal network and infrastructure.

    For several years now, vulnerable network devices have been the attack-vector of choice and one of the most effective techniques for sophisticated hackers and advanced threat actors. In this environment, there has never been a greater

    need to improve network infrastructure security. Unlike hosts that receive significant administrative security attention and for which security tools such

    as anti-malware exist, network devices are often working in the background with

    little oversightùuntil network connectivity is broken or diminished. Malicious cyber actors take advantage of this fact and often target network devices. Once

    on the device, they can remain there undetected for long periods. After an incident, where administrators and security professionals perform forensic analysis and recover control, a malicious cyber actor with persistent access on

    network devices can reattack the recently cleaned hosts. For this reason, administrators need to ensure proper configuration and control of network devices.

    Proliferation of Threats to Information Systems

    "SYNful Knock"

    In September 2015, an attack known as SYNful Knock was disclosed. SYNful Knock silently changes a routerÆs operating system image, thus allowing attackers to gain a foothold on a victimÆs network. The malware can be customized and updated once embedded. When the modified malicious image is uploaded, it provides a backdoor into the victimÆs network. Using a crafted TCP SYN packet, a communication channel is established between the compromised device and the malicious command and control (C2) server. The impact of this infection to a network or device is severe and most likely indicates that there may be additional backdoors or compromised devices on the network. This foothold gives

    an attacker the ability to maneuver and infect other hosts and access sensitive

    data.

    The initial infection vector does not leverage a zero-day vulnerability. Attackers either use the default credentials to log into the device or obtain weak credentials from other insecure devices or communications. The implant resides within a modified IOS image and, when loaded, maintains its persistence

    in the environment, even after a system reboot. Any further modules loaded by the attacker will only exist in the routerÆs volatile memory and will not be available for use after the device reboots. However, these devices are rarely or never rebooted.

    To prevent the size of the image from changing, the malware overwrites several legitimate IOS functions with its own executable code. The attacker examines the functionality of the router and determines functions that can be overwritten without causing issues on the router. Thus, the overwritten functions will vary upon deployment.

    The attacker can utilize the secret backdoor password in three different authentication scenarios. In these scenarios the implant first checks to see if

    the user input is the backdoor password. If so, access is granted. Otherwise, the implanted code will forward the credentials for normal verification of potentially valid credentials. This generally raises the least amount of suspicion. Cisco has provided an alert on this attack vector. For more information, see the Cisco SYNful Knock Security Advisory [ http://www.cisco.com/c/en/us/about/security-center/event-response/synful-knock.

    html ].

    Other attacks against network infrastructure devices have also been reported, including more complicated persistent malware that silently changes the firmware on the device that is used to load the operating system so that the malware can inject code into the running operating system. For more information, please see Cisco's description of the evolution of attacks on Cisco IOS devices [ http://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-devices ].

    "Cisco Adaptive Security Appliance (ASA)"

    A Cisco ASA device is a network device that provides firewall and Virtual Private Network (VPN) functionality. These devices are often deployed at the edge of a network to protect a siteÆs network infrastructure, and to give remote users access to protected local resources.

    In June 2016, NCCIC received several reports of compromised Cisco ASA devices that were modified in an unauthorized way. The ASA devices directed users to a location where malicious actors tried to socially engineer the users into divulging their credentials.

    It is suspected that malicious actors leveraged CVE-2014-3393 [ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3393 ]to inject malicious code into the affected devices. The malicious actor would then be able to modify the contents of the Random Access Memory Filing System (RAMFS) cache file system and inject the malicious code into the applianceÆs configuration. Refer to the Cisco Security Advisory Multiple Vulnerabilities in

    Cisco ASA Software [ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-

    20141008-asa ]for more information and for remediation details.

    In August 2016, a group known as ôShadow Brokersö publicly released a large number of files, including exploitation tools for both old and newly exposed vulnerabilities. Cisco ASA devices were found to be vulnerable to the released exploit code. In response, Cisco released an update to address a newly disclosed Cisco ASA Simple Network Management Protocol (SNMP) remote code execution vulnerability (CVE-2016-6366 [ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6366 ]). In addition,

    one exploit tool targeted a previously patched Cisco vulnerability (CVE-2016-6367 [ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6367

    ]). Although Cisco provided patches [ http://blogs.cisco.com/security/shadow-brokers ] to fix this Cisco ASA command-line interface (CLI) remote code execution vulnerability in 2011, devices that remain unpatched are still vulnerable to the described attack. Attackers may target vulnerabilities for months or even years after patches become available.

    Impact

    If the network infrastructure is compromised, malicious hackers or adversaries can gain full control of the network infrastructure enabling further compromise

    of other types of devices and data and allowing traffic to be redirected, changed, or denied. Possibilities of manipulation include denial-of-service, data theft, or unauthorized changes to the data.

    Intruders with infrastructure privilege and access can impede productivity and severely hinder re-establishing network connectivity. Even if other compromised

    devices are detected, tracking back to a compromised infrastructure device is often difficult.

    Malicious actors with persistent access to network devices can reattack and move laterally after they have been ejected from previously exploited hosts.
    á

    Solution

    1.ááá Segregate Networks and Functions

    Proper network segmentation is a very effective security mechanism to prevent an intruder from propagating exploits or laterally moving around an internal network. On a poorly segmented network, intruders are able to extend their impact to control critical devices or gain access to sensitive data and intellectual property. Security architects must consider the overall infrastructure layout, segmentation, and segregation. Segregation separates network segments based on role and functionality. A securely segregated network

    can contain malicious occurrences, reducing the impact from intruders, in the event that they have gained a foothold somewhere inside the network.

    "Physical Separation of Sensitive Information"

    Local Area Network (LAN) segments are separated by traditional network devices such as routers. Routers are placed between networks to create boundaries, increase the number of broadcast domains, and effectively filter usersÆ broadcast traffic. These boundaries can be used to contain security breaches by

    restricting traffic to separate segments and can even shut down segments of the

    network during an intrusion, restricting adversary access.

    Recommendations:

    * Implement Principles of Least Privilege and need-to-know when designing network segments.
    * Separate sensitive information and security requirements into network segments.
    * Apply security recommendations and secure configurations to all network segments and network layers.

    "Virtual Separation of Sensitive Information ááááááá"

    As technologies change, new strategies are developed to improve IT efficiencies

    and network security controls. Virtual separation is the logical isolation of networks on the same physical network. The same physical segmentation design principles apply to virtual segmentation but no additional hardware is required. Existing technologies can be used to prevent an intruder from breaching other internal network segments.

    Recommendations:

    * Use Private Virtual LANs to isolate a user from the rest of the broadcast domains.
    * Use Virtual Routing and Forwarding (VRF) technology to segment network traffic over multiple routing tables simultaneously on a single router.
    * Use VPNs to securely extend a host/network by tunneling through public or private networks.

    2.ááá Limit Unnecessary Lateral Communications

    Allowing unfiltered workstation-to-workstation communications (as well as other

    peer-to-peer communications) creates serious vulnerabilities, and can allow a network intruder to easily spread to multiple systems. An intruder can establish an effective ôbeach headö within the network, and then spread to create backdoors into the network to maintain persistence and make it difficult

    for defenders to contain and eradicate.

    Recommendations:

    * Restrict communications using host-based firewall rules to deny the flow of

    packets from other hosts in the network. The firewall rules can be created to filter on a host device, user, program, or IP address to limit access from services and systems.
    * Implement a VLAN Access Control List (VACL), a filter that controls access to/from VLANs. VACL filters should be created to deny packets the ability to flow to other VLANs.
    * Logically segregate the network using physical or virtual separation allowing network administrators to isolate critical devices onto network segments.
    á

    3.ááá Harden Network Devices

    A fundamental way to enhance network infrastructure security is to safeguard networking devices with secure configurations. Government agencies, organizations, and vendors supply a wide range of resources to administrators on how to harden network devices. These resources include benchmarks and best practices. These recommendations should be implemented in conjunction with laws, regulations, site security policies, standards, and industry best practices. These guides provide a baseline security configuration for the enterprise that protects the integrity of network infrastructure devices. This guidance supplements the network security best practices supplied by vendors.

    Recommendations:

    * Disable unencrypted remote admin protocols used to manage network infrastructure (e.g., Telnet, FTP).
    * Disable unnecessary services (e.g. discovery protocols, source routing, HTTP, SNMP, BOOTP).
    * Use SNMPv3 (or subsequent version) but do not use SNMP community strings.
    * Secure access to the console, auxiliary, and VTY lines.
    * Implement robust password policies and use the strongest password encryption available.
    * Protect router/switch by controlling access lists for remote administration.
    * Restrict physical access to routers/switches.
    * Backup configurations and store offline. Use the latest version of the network device operating system and update with all patches.
    * Periodically test security configurations against security requirements.
    * Protect configuration files with encryption and/or access controls when sending them electronically and when they are stored and backed up.
    á

    4.ááá Secure Access to Infrastructure Devices

    Administrative privileges on infrastructure devices allow access to resources that are normally unavailable to most users and permit the execution of actions

    that would otherwise be restricted. When administrator privileges are improperly authorized, granted widely, and/or not closely audited, intruders can exploit them. These compromised privileges can enable adversaries to traverse a network, expanding access and potentially allowing full control of the infrastructure backbone. Unauthorized infrastructure access can be mitigated by properly implementing secure access policies and procedures.

    Recommendations:

    * Implement Multi-Factor Authentication û Authentication is a process to validate a userÆs identity. Weak authentication processes are commonly exploited by attackers. Multi-factor authentication uses at least two identity components to authenticate a userÆs identity. Identity components include something the user knows (e.g., password); an object the user has possession of

    (e.g., token); and a trait unique to the specific person (e.g., biometric).
    * Manage Privileged Access û Use an authorization server to store access information for network device management. This type of server will enable network administrators to assign different privilege levels to users based on the principle of least privilege. When a user tries to execute an unauthorized command, it will be rejected. To increase the strength and robustness of user authentication, implement a hard token authentication server in addition to the

    AAA server, if possible. Multi-factor authentication increases the difficulty for intruders to steal and reuse credentials to gain access to network devices.


    * Manage Administrative Credentials û Although multi-factor authentication is

    highly recommended and a best practice, systems that cannot meet this requirement can at least improve their security level by changing default passwords and enforcing complex password policies. Network accounts must contain complex passwords of at least 14 characters from multiple character domains including lowercase, uppercase, numbers, and special characters. Enforce password expiration and reuse policies. If passwords are stored for emergency access, keep these in a protected off-network location, such as a safe.
    á

    5.ááá Perform Out-of-Band Management

    Out-of-Band (OoB) management uses alternate communication paths to remotely manage network infrastructure devices. These dedicated paths can vary in configuration to include anything from virtual tunneling to physical separation. Using OoB access to manage the network infrastructure will strengthen security by limiting access and separating user traffic from network

    management traffic. OoB management provides security monitoring and can implement corrective actions without allowing the adversary who may have already compromised a portion of the network to observe these changes.

    OoB management can be implemented physically or virtually, or through a hybrid of the two. Building additional physical network infrastructure is the most secure option for the network managers, although it can be very expensive to implement and maintain. Virtual implementation is less costly, but still requires significant configuration changes and administration. In some situations, such as access to remote locations, virtual encrypted tunnels may be the only viable option.

    Recommendations:

    * Segregate standard network traffic from management traffic.
    * Enforce that management traffic on devices only comes from the OoB.
    * Apply encryption to all management channels.
    * Encrypt all remote access to infrastructure devices such as terminal or dial-in servers.
    * Manage all administrative functions from a dedicated host (fully patched) over a secure channel, preferably on the OoB.
    * Harden network management devices by testing patches, turning off unnecessary services on routers and switches, and enforcing strong password policies. Monitor the network and review logs Implement access controls that only permit required administrative or management services (SNMP, NTP SSH, FTP,

    TFTP).
    á

    6.ááá Validate Integrity of Hardware and Software

    Products purchased through unauthorized channels are often known as ôcounterfeit,ö ôsecondary,ö or ôgrey marketö devices. There have been numerous reports in the press regarding grey market hardware and software being introduced into the marketplace. Grey market products have not been thoroughly tested to meet quality standards and can introduce risks to the network. Lack of awareness or validation of the legitimacy of hardware and software presents a serious risk to usersÆ information and the overall integrity of the network environment. Products purchased from the secondary market run the risk of having the supply chain breached, which can result in the introduction of counterfeit, stolen, or second-hand devices. This could affect network performance and compromise the confidentiality, integrity, or availability of network assets. Furthermore, breaches in the supply chain provide an opportunity for malicious software or hardware to be installed on the equipment. In addition, unauthorized or malicious software can be loaded onto a

    device after it is in operational use, so integrity checking of software should

    be done on a regular basis.

    Recommendations:

    * Maintain strict control of the supply chain; purchase only from authorized resellers.
    * Require resellers to implement a supply chain integrity check to validate hardware and software authenticity.
    * Inspect the device for signs of tampering.
    * Validate serial numbers from multiple sources.
    * Download software, updates, patches, and upgrades from validated sources.
    * Perform hash verification and compare values against the vendorÆs database to detect unauthorized modification to the firmware.
    * Monitor and log devices, verifying network configurations of devices on a regular schedule.
    * Train network owners, administrators, and procurement personnel to increase

    awareness of grey market devices.

    á

    *Shadow Broker Exploits* *Vendor* *CVE* *Exploit Name* *Vulnerability* Fortinet

    CVE-2016-6909 [ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6909 ]ááá EGREGIOUSBLUNDER Authentication cookie overflow WatchGuardááá CVE-2016-7089 [ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7089 ] ESCALATEPLOWMAN Command line injection via ipconfig Cisco CVE-2016-6366 [ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6366 ] EXTRABACON SNMP remote code execution Cisco CVE-2016-6367 [ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6367 ] EPICBANANA Command line injection remote code execution Cisco N/A BENIGNCERTAIN/PIXPOCKETááá Information/memory leak TOPSEC N/A ELIGIBLEBACHELOR Attack vector unknown, but has an XML-like payload
    beginning with <?tos length="001e.%8.8x"? TOPSEC N/A ELIGIBLEBOMBSHELL HTTP cookie command injection TOPSEC N/A ELIGIBLECANDIDATE HTTP cookie command injection TOPSEC N/A ELIGIBLECONTESTANT HTTP POST parameter injection

    á

    References

    * Cisco SYNful Knock Security Advisory [ http://www.cisco.com/c/en/us/about/security-center/event-response/synful-knock.

    html ]
    * Cisco Security Advisory Multiple Vulnerabilities in Cisco ASA Software [ https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-

    20141008-asa ]
    * Cisco Evolution of Attacks on Cisco IOS Devices [ https://blogs.cisco.com/security/evolution-of-attacks-on-cisco-ios-devices ]
    * Cisco IOS Software Integrity Assurance [ https://cisco.com/c/en/us/about/security-center/integrity-assurance.html ]
    * Information Assurance Advisory NO. IAA U/OO/802097-16 Mitigate Unauthorized

    Cisco ROMMON [ https://www.iad.gov/iad/library/ia-advisories-alerts/recommendations-to-mitigat

    e-unauthorized-cisco-rommon-access-and-validate-boot-roms.cfm ]
    * Information Assurance Advisory NO. IAA U/OO/802488-16 Vulnerabilities in Cisco Adaptive Security Appliances [ https://www.iad.gov/iad/library/ia-advisories-alerts/vulnerability-in-cisco-ada

    ptive-security-appliances-identified-in-open-source-v1.cfm ]
    * Information Assurance Directorate Network Mitigations Package û Infrastructure [ https://www.iad.gov/iad/library/ia-guidance/security-tips/network-mitigations-p

    ackage-infrastructure.cfm ]

    Revision History

    * September 6, 2016: Initial release ________________________________________________________________________

    This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy & Use [ http://www.us-cert.gov/privacy/ ] policy.

    ________________________________________________________________________

    A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have questions, please send an email to info@us-cert.gov. Do not reply to this message since this email was sent from a notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT@ncas.us-cert.gov to your address book.

    OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ http://www.us-cert.gov/security-publications ] | Alerts and Tips

    [ http://www.us-cert.gov/ncas ] | Related Resources [ http://www.us-cert.gov/related-resources ]

    STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ]

    SUBSCRIBER SERVICES:
    Manage Preferences [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscribers/new?preferences=

    true ]áá|ááUnsubscribe [ https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/one_click_unsubs

    cribe?verification=5.43e66354f7e069837b41e0fec3b03174&destination=Fido4cmech%40

    lusfiber.net ]áá|ááHelp [ https://subscriberhelp.govdelivery.com/ ]

    ________________________________________________________________________

    This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf of:

    United States Computer Emergency Readiness Team (US-CERT) ╖ 245 Murray Lane SW Bldg 410 ╖ Washington, DC 20598 ╖á(888) 282-0870 Powered by GovDelivery [ http://www.govdelivery.com/portals/powered-by ]


    -----
    No virus found in this message.
    Checked by AVG - www.avg.com
    Version: 2016.0.7752 / Virus Database: 4649/12959 - Release Date: 09/06/16

    === Cut ===


    -+-
    Keep the faith :^)

    Ben aka cMech Web: http|ftp|binkp|telnet://cmech.dynip.com
    Email: fido4cmech(at)lusfiber.net
    Home page: http://cmech.dynip.com/homepage/
    WildCat! Board 24/7 +1-337-984-4794 any BAUD 8,N,1

    ... I remember when Saturns were ROCKETS, not cars!
    --- GoldED+/W32-MSVC v1.1.5 via Mystic BBS
    * Origin: FIDONet - The Positronium Repository (1:393/68)