Immune Systems:
* Cisco Network Registrar version 7.2
During the initial installation, users are not forced to change this password, allowing it to persist after the installation. An attacker who is aware of this vulnerability could authenticate with administrative privileges and arbitrarily change the configuration of Cisco Network Registrar.
The upgrade to Software Release 7.2 is not free; however, a workaround is provided in this document that will prevent exploitation of the vulnerability.
When performing an upgrade to Software Release 7.2, you must use the workaround to change the password of the administrative account. You will be prompted to enter a new administrator's password only if you are performing a new installation of Software Release 7.2 of Cisco Network Registrar.
Workaround:
The provided workaround changes the password that is associated with the administrator's account.
To change the password using the web interface, select Advanced -> Administrators -> Admin from the menu.
Execute the following command to change the administrator's password using the command-line interface:
admin enterPassword
Additionally, access to Cisco Network Registrar (TCP ports 8080, 8090, 8443, and 8453) and the host on which it is running should be limited to legitimate IP addresses. Consult the documentation of the host operating system for further details how to accomplish this task.
The use of IP addresses as a form of authentication is a well-established network security practice. For more guidance on the use of access control lists (ACLs) or the explicit identification of network management stations in devices and applications, reference the white paper A Security-Oriented Approach to IP Addressing at the following link: http://www.cisco.com/web/about/security/intelligence/security-for-ip-addr.html.