Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.1884.2 SaltStack FrameWork Vulnerabilities Affecting Cisco Products 18 June 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco Modeling Labs Corporate Edition Cisco Virtual Internet Routing Lab Personal Edition Cisco TelePresence IX5000 Series Publisher: Cisco Systems Operating System: Cisco Linux variants Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Unauthorised Access -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-11652 CVE-2020-11651 Reference: ESB-2020.1756 ESB-2020.1640 ESB-2020.1607.2 ESB-2020.1547 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-salt-2vx545AG Comment: Cisco has marked this as of priority Critical. Revision History: June 18 2020: Cisco added another vulnerable product May 29 2020: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- SaltStack FrameWork Vulnerabilities Affecting Cisco Products Priority: Critical Advisory ID: cisco-sa-salt-2vx545AG First Published: 2020 May 28 16:00 GMT Last Updated: 2020 June 16 15:17 GMT Version 2.0: Final Workarounds: YesCisco Bug IDs: CSCvu33581CSCvu43116 CVE-2020-11651 CVE-2020-11652 CWE-20 Summary o On April 29, 2020, the Salt Open Core team notified their community regarding the following two CVE-IDs: CVE-2020-11651: Authentication Bypass Vulnerability CVE-2020-11652: Directory Traversal Vulnerability Cisco Modeling Labs Corporate Edition (CML), Cisco TelePresence IX5000 Series, and Cisco Virtual Internet Routing Lab Personal Edition (VIRL-PE) incorporate a version of SaltStack that is running the salt-master service that is affected by these vulnerabilities. Cisco has released software updates that address these vulnerabilities. There are workarounds that address these vulnerabilities. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-salt-2vx545AG Affected Products o Vulnerable Products These vulnerabilities affect the following Cisco products if they are running a vulnerable software release: Modeling Labs Corporate Edition (CML) TelePresence IX5000 Series Virtual Internet Routing Lab Personal Edition (VIRL-PE) Cisco CML and Cisco VIRL-PE Cisco CML and Cisco VIRL-PE can be deployed either in standalone or cluster configurations. The vulnerabilities will impact each deployment differently. For impact information and recommended actions, see the table in the Details section of this advisory. Note: Cisco infrastructure maintains the salt-master servers that are used with Cisco VIRL-PE. Those servers were upgraded on May 7, 2020. Cisco identified that the Cisco maintained salt-master servers that are servicing Cisco VIRL-PE releases 1.2 and 1.3 were compromised. The servers were remediated on May 7, 2020. The following servers were compromised: us-1.virl.info us-2.virl.info us-3.virl.info us-4.virl.info vsm-us-1.virl.info vsm-us-2.virl.info Cisco VIRL-PE connects back to Cisco maintained Salt Servers that are running the salt-master service. These servers are configured to communicate with a different Cisco salt-master server, depending on which release of Cisco VIRL-PE software is running. Administrators can check the configured Cisco salt-master server by navigating to VIRL Server > Salt Configuration and Status . Cisco CML does not connect back to any Cisco maintained Salt Servers. Cisco TelePresence IX5000 Series Salt services are enabled by default on Cisco TelePresence IX5000 Series. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by these vulnerabilities. Details o Cisco CML and Cisco VIRL-PE For information about Cisco CML and Cisco VIRL-PE, see Cisco Modeling Labs . For Cisco CML and Cisco VIRL-PE software releases 1.5 and 1.6, if the salt-master service is enabled, the exploitability of the product depends on how the product has been deployed. To be exploited, the salt-master service must be reachable on TCP ports 4505 and 4506. For any installation that is found with salt-master service running, Cisco would recommend either inspecting the machine for compromise or doing a re-image of the machine and installing the latest version of Cisco CML or Cisco VIRL-PE. To check the status of the salt-master service on the installation of Cisco CML and Cisco VIRL-PE, log in to the device and execute the command sudo systemctl status salt-master. If the salt-master service is active, as indicated by Active: active (running), the device is vulnerable and Cisco recommends following the actions listed in the table below. The following example shows a device where the salt-master service is enabled: virl@virl:~$ sudo systemctl status salt-master salt-master.service - The Salt Master Server Loaded: loaded (/lib/systemd/system/salt-master.service; disabled; vendor preset: enabled) Drop-In: /etc/systemd/system/salt-master.service.d +-override.conf Active: active (running) since Thu 2020-05-28 17:55:10 GMT; 1s ago Docs: man:salt-master(1) file:///usr/share/doc/salt/html/contents.html https://docs.saltstack.com/en/latest/contents.html Main PID: 20662 (/usr/bin/python) Tasks: 16 Memory: 217.9M CPU: 7.870s CGroup: /system.slice/salt-master.service +-20662 /usr/bin/python /usr/bin/salt-master ProcessManage +-20789 /usr/bin/python /usr/bin/salt-master MultiprocessingLoggingQueu +-20793 /usr/bin/python /usr/bin/salt-master ZeroMQPubServerChanne +-20794 /usr/bin/python /usr/bin/salt-master EventPublishe +-20797 /usr/bin/python /usr/bin/salt-master Maintenanc +-20798 /usr/bin/python /usr/bin/salt-master ReqServer_ProcessManage +-20799 /usr/bin/python /usr/bin/salt-master MWorkerQueu +-20804 /usr/bin/python /usr/bin/salt-master MWorker- +-20805 /usr/bin/python /usr/bin/salt-master MWorker- +-20806 /usr/bin/python /usr/bin/salt-master MWorker-May 28 17:55:08 virl systemd[1]: Starting The Salt Master Server... May 28 17:55:10 virl systemd[1]: Started The Salt Master Server. virl@virl:~$ The following example shows a device where the salt-master service is not enabled: virl@virl:~$ sudo systemctl status salt-master salt-master.service - The Salt Master Server Loaded: loaded (/lib/systemd/system/salt-master.service; disabled; vendor preset: enabled) Drop-In: /etc/systemd/system/salt-master.service.d +-override.conf Active: inactive (dead) Docs: man:salt-master(1) file:///usr/share/doc/salt/html/contents.html https://docs.saltstack.com/en/latest/contents.html The following table lists the impact and recommended action for each deployment option for each Cisco software release. Cisco Deployment Recommended Action CML and Option VIRL-PE Impact Software Release 2.0 Standalone Not affected. Does not run None. Salt services. 2.0 Cluster Not affected. Not currently None. Mode supported. Check the status of the salt-master service using For customers who performed the sudo systemctl status a fresh install, there is salt-master command. If the no impact. An install runs salt-master service is the salt-minion process running, do one of the only when required; it does following: 1.6 Standalone not run a salt-master service. o Upgrade to a patched release, which will For customers who upgraded disable the salt-master from Release 1.5, a service. ^1 salt-master service is o Disable the salt-master running. service using the workaround. Check the status of the salt-master service using For customers who performed the sudo systemctl status a fresh install, there is salt-master command. If the no impact. The controller salt-master service is runs SaltStack Master and running, do one of the communicates with compute following: 1.6 Cluster nodes - SaltStack bound Mode only to private network. o Upgrade to patched release, which will For customers who upgraded disable the salt-master from 1.5, a salt-master service on all service is running. interfaces except the internal (INT) network. ^1 Check the status of the salt-master service using the sudo systemctl status Salt-minion service salt-master command. If the running. salt-master service is running, do one of the Salt-master service running following: 1.5 Standalone (bound to all interfaces). o Upgrade to a patched Note: Salt services are not release, which will running on CML. disable the salt-master service. ^1 o Disable the salt-master service using the workaround. Salt-minion service Upgrade to patched release, running. which will disable the 1.5 Cluster salt-master service on all Mode Salt-master service running interfaces except the (bound to all interfaces). internal (INT) network. ^1 CML Do one of the following: o Upgrade to a patched release, which will Salt-minion service disable the salt-master running. service. ^1 1.3 Standalone o Disable the salt-master Salt-master service running service using the (bound to all interfaces). workaround. VIRL-PE Re-image the machines and install the VIRL-PE patched release. ^1 CML Migrate to a patched Salt-minion service release. ^1 Cluster running. 1.3 Mode VIRL-PE Salt-master service running (bound to all interfaces). Re-image the machines and install the VIRL-PE patched release. ^1 CML Do one of the following: o Upgrade to a patched release, which will Salt-minion service disable the salt-master running. service. ^1 1.2 Standalone o Disable the salt-master Salt-master service running service using the (bound to all interfaces). workaround. VIRL-PE Re-image the machines and install the VIRL-PE patched release. ^1 CML Salt-minion service Migrate to a patched running. release. ^1 1.2 Cluster Mode Salt-master service running VIRL-PE (bound to all interfaces). Re-image the machines and install the VIRL-PE patched release. ^1 1. For recommended patched software releases, see the Fixed Software section of this advisory. Cisco TelePresence IX5000 Series Salt services are enabled by default on Cisco TelePresence IX5000 Series, but these services are not required for normal operation. For information about disabling the services, see the Workarounds section. Workarounds o Cisco CML and Cisco VIRL-PE Cisco CML and Cisco VIRL-PE software releases 2.0 and later do not run the salt-master service. For Cisco CML and Cisco VIRL-PE deployed in standalone mode, administrators can check the status of the salt-master service and disable the service as shown in the following example: virl@virl:~$ sudo systemctl status salt-master salt-master.service - The Salt Master Server Loaded: loaded (/lib/systemd/system/salt-master.service; disabled; vendor preset: enabled) Drop-In: /etc/systemd/system/salt-master.service.d +-override.conf Active: active (running) since Thu 2020-05-28 17:55:10 GMT; 1s ago Docs: man:salt-master(1) file:///usr/share/doc/salt/html/contents.html https://docs.saltstack.com/en/latest/contents.html --- Output Omitted --- virl@virl:~$ sudo systemctl stop salt-master virl@virl:~$ sudo systemctl disable salt-master Synchronizing state of salt-master.service with SysV init with /lib/systemd/systemd-sysv-install... Executing /lib/systemd/systemd-sysv-install disable salt-master insserv: warning: current start runlevel(s) (empty) of script `salt-master' overrides LSB defaults (2 3 4 5). insserv: warning: current stop runlevel(s) (0 1 2 3 4 5 6) of script `salt-master' overrides LSB defaults (0 1 6). virl@virl:~$ For Cisco CML and Cisco VIRL-PE deployed in cluster mode, administrators can check the status of the salt-master service and disable the service on all compute nodes. Follow the steps shown above for standalone deployments. On the cluster controller node, ensure that the salt-master is listening only on the private network interface for inter-cluster communication, as shown in the following example: virl@virl:~$ netstat -tulpn | grep 450 (Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.) tcp 0 0 172.16.10.250:4505 0.0.0.0:* LISTEN - tcp 0 0 172.16.10.250:4506 0.0.0.0:* LISTEN - virl@virl:~$ If the salt-master is listening on all interfaces as shown in the following example, customers will need to upgrade to a patched release: virl@virl:~$ netstat -tulpn | grep 450 (Not all processes could be identified, non-owned process info will not be shown, you would have to be root to see it all.) tcp 0 0 0.0.0.0:4505 0.0.0.0:* LISTEN - tcp 0 0 0.0.0.0:4506 0.0.0.0:* LISTEN - virl@virl:~$ Cisco TelePresence IX5000 Series To disable Salt services permanently on Cisco TelePresence IX5000 Series, modifications must be made to the startup script files, which requires root access on the device. For assistance, contact the Cisco TAC through your support organization. Fixed Software o Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/ end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c /en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Fixed Releases Cisco CML For customers who are running the software in standalone deployments, Cisco recommends migrating to Cisco CML Release 2.0. To download the software from the Software Center on Cisco.com, do the following: 1. Click Browse all . 2. Choose Cloud and Systems Management > Network Modeling > Modeling Labs . 3. Choose a release from left pane. For customers who cannot migrate to Release 2.0, Cisco recommends migrating to Release 1.6.67. Cisco CML does not support in-place upgrades for any Cisco CML 1.x releases. Customers are advised to migrate to a new Cisco CML Release 1.6.67 or Release 2.0 installation. Cisco fixed this vulnerability in Cisco CML Release 1.6.67. This release upgrades the version of SaltStack, which contains the fixes for both vulnerabilities. Customers who are running Cisco CML Release 1.6.65, which has Salt services enabled on only the private interfaces, are also advised to upgrade to Release 1.6.67. Cisco VIRL-PE Cisco recommends migrating to Cisco VIRL-PE Release 2.0, which has been rebranded Cisco Modeling Labs - Personal. For upgrade instructions, see HOW-TO: Upgrade your Virtual Internet Routing Lab Instance to Cisco Modeling Labs - Personal v2.0 . For customers with standalone deployments who cannot migrate to Cisco VIRL-PE Release 2.0, Cisco recommends upgrading to Release 1.6.66 through the UWM interface to ensure that the salt-master service is disabled. Upgrade instructions are available at http://get.virl.info/upgrd.1.3.php . For customers with cluster mode deployments who are running Release 1.5 or Release 1.6, Cisco recommends upgrading to Release 1.6.67 through the UWM interface to ensure that the salt-master service is disabled and upgraded to a fixed SaltStack version. Customers who are running Release 1.3 are advised to migrate to the latest 1.6 release. Cisco fixed this vulnerability in Cisco VIRL-PE Release 1.6.67. This release upgrades the version of SaltStack, which contains the fixes for both vulnerabilities. Customers who are running 1.6.66, which has Salt services disabled, are also advised to upgrade to Release 1.6.67. Cisco TelePresence IX5000 Series Cisco will not release fixed software for Cisco TelePresence IX5000 Series, as the product has entered end of life. To disable Salt services permanently on Cisco TelePresence IX5000 Series, modifications must be made to the startup script files, which requires root access on the device. For assistance, contact the Cisco TAC through your support organization. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) became aware of additional attempted exploitation of these vulnerabilities in the wild. Cisco continues to strongly recommend that customers upgrade to a fixed software release to remediate these vulnerabilities. Source o These vulnerabilities were made public by the Salt Open Core team on April 29, 2020. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-salt-2vx545AG Revision History o +---------+-------------------------+--------------+--------+-------------+ | Version | Description | Section | Status | Date | +---------+-------------------------+--------------+--------+-------------+ | | Added Cisco | Summary, | | | | | TelePresence IX5000 | Vulnerable | | | | | Series as a vulnerable | Products, | | | | 2.0 | product. Added Release | Details, | Final | 2020-JUN-17 | | | 1.6.67 as a fixed | Workarounds, | | | | | release for both Cisco | Fixed | | | | | VIRL-PE and Cisco CML. | Software | | | +---------+-------------------------+--------------+--------+-------------+ | 1.0 | Initial public release. | - | Final | 2020-MAY-28 | +---------+-------------------------+--------------+--------+-------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXuqtjONLKJtyKPYoAQj6IhAAiDYyOs8ZzOeE+P/3NzolgYWr3Lx4TVsX mYXhHSofrzaWXoL0tPlamI4+9XQIaaCzCf/BItdpC+mHluc03SUr7dvSCr1p5kfs GOU9DI3cHbR/7LO9H796b7ajjwJbmCshT0esMEToUfDDXbaOkKJA2oIe9XPPAIj0 gAIzRZvoecQMBXXDmQ2L0ubRleTJ8R8Chluqqk8IGTilAiy1tHbnpZ64Ellf+Wrt e4r8JVil1VO4fS4cx2srH+JpV4iw0XJ2WhKu+CkhDyfLyGXSx/KdhkBj6oJA8wt+ 2dZxQTo+3xY8JENoZKS9XvbHiDX0cIWqfrR+yw9/stRGhgSMRC9uHGRBEhXGXluc WbcnGBugCMhC2WxXlwhiKxp90/s1Bjhj9FXc9LOCBQTTzy/G0/5p6xqE3/5yIXfk 5XnjwN/ogh3GCgc2v/M0J3KsUc2fpKWiZjtiy787wUnrKmObvwYBRBtolL0XBLs+ sfKuYaB2SWSh+M1kO8VYYRXos+vHx4kFl0W6sGElYzaciqr6ep2HGqZrMv4h6xhv G8RGmNlVJq1GdPMheneBSFvYcsrmGCzyRzbay8KCK/3UKFscvsqRBcw4lenD/Mm2 g4rex0z2e1texa/V5CEjKfAACGXMsow4pUJJKDZDKUhlnJ1L4tQ6m3Flj/GOkNsd kWFZO5M3RU4= =ERAP -----END PGP SIGNATURE-----