Owning nx os-sec-t_2010

17
George Hedfors • Working for Cybercom Sweden East AB (http://www.cybercomgroup.com) • 12 years as IT- and information security consultant Previously worked for iX Security, Defcom, NetSec, n.runs and Pinion Contact [email protected] Web page http://george.hedfors.com Owning the data centre, Cisco NX-OS 2010-08-10 SEC-T 2010 1

description

Slides presented at SEC-T September 10th, 2010.

Transcript of Owning nx os-sec-t_2010

Page 1: Owning nx os-sec-t_2010

SEC-T 20101

George Hedfors• Working for Cybercom Sweden East AB

(http://www.cybercomgroup.com)• 12 years as IT- and information security consultant

– Previously worked for iX Security, Defcom, NetSec, n.runs and Pinion

Contact [email protected]

Web page http://george.hedfors.com

Owning the data centre, Cisco NX-OS

2010-08-10

Page 2: Owning nx os-sec-t_2010

• Short intro to Cisco NX-OS• History of research• Overview of underlying Linux• Disclosure of vulnerabilities

– Undocumented CLi commands– Command line interface escape– Layer 2 attack– Undocumented user account– 2nd CLi escape (delayed)

• FAQ

Topics

2010-08-10 SEC-T2

Page 3: Owning nx os-sec-t_2010

• Based on MontaVista (http://www.mvista.com)embedded Linux with kernel 2.6.10

• VDC Virtualization, Virtual Device Context

What is NX-OS?

2010-08-10 SEC-T 20103

Nexus 4000 (for IBM BladeCenter)Nexus 5000Nexus 7000MDS 9500 FC DirectorsMDS 9222i FC SwitchMDS 9100 FC Switches

Page 4: Owning nx os-sec-t_2010

• Accidentally made a Cisco-7020 fall over due to an 9 years old denial of service attack

• Was able to recover CORE dumps from the attack• Able to extract all files from the Cisco .bin

installation package• Found a number of exploitable vulnerabilities

To do• Dig deeper into Cisco VDC/VRF security

What has been done

2010-08-10 SEC-T4

Page 5: Owning nx os-sec-t_2010

Typical environment• Banking/finance• Other large data centers

Impact• Full exposure of interconnected networks and

VLAN’s• Possibility to eavesdrop and traffic

modification• Switch based rootkit installation?

Cisco 7000-series

2010-08-10 SEC-T5

Page 6: Owning nx os-sec-t_2010

Overview

2010-08-10 SEC-T6

Linux

Page 7: Owning nx os-sec-t_2010

Teh Linux

2010-08-10 SEC-T7

root?!?

Page 8: Owning nx os-sec-t_2010

DC3 Shell ‘the regular Cisco cli’• Configurations contain ‘hidden’ commands

Hidden commands

2010-08-10 SEC-T8

Page 9: Owning nx os-sec-t_2010

Escaping CLi

2010-08-10 SEC-T9

Page 10: Owning nx os-sec-t_2010

How could that happened?!

2010-08-10 SEC-T10

What could possibly go wrong here?

/usr/bin/gdbserver

Page 11: Owning nx os-sec-t_2010

Cisco Discovery Protocol (CDP)• 2001, FX crafted the first CDP DoS attack• 2010, the CDP attack was rediscovered in NX-OS

What about layer 2?

2010-08-10 SEC-T11

• CDP has become demonized and is now running under the ‘root’ user context

Page 12: Owning nx os-sec-t_2010

The core dump

2010-08-10 SEC-T12

Page 13: Owning nx os-sec-t_2010

So, where ‘ftpuser’ come from?

Default user? Backdoor? Easter egg?

Recovered password ‘nbv123’

Undocumented user account

2010-08-10 SEC-T13

Page 14: Owning nx os-sec-t_2010

Searching for ‘nbv123’

2010-08-10 SEC-T14

Page 15: Owning nx os-sec-t_2010

• CSCti03724 – CLI escape in NX-OS using GDB– Workaround: None– Fixed in NX-OS 4.1(4)

• CSCti04026 – Undocumented user available with default password on NX-OS system– Workaround: None

• CSCtf08873 – CDP with long hostname crashes CDPD on N7k– Workaround: Disable CDP

• CSCti85295 – NX-OS: SUDO privilege escalation– Workaround: None

Bug tracking

2010-08-10 SEC-T15

Page 16: Owning nx os-sec-t_2010

Special thanks to Juan-Manuel Gonzales, PSIRT Incident Manager <[email protected]>

Thanks

2010-08-10 SEC-T16

Page 17: Owning nx os-sec-t_2010

Questions?

Contact [email protected]

FAQ

2010-08-10 SEC-T17