Cisco Reveals 'Black Hat' Flaw

The security flaw outed by
former researcher Michael Lynn at this week's Black Hat Briefings conference in Las Vegas is now the subject of a formal security advisory from Cisco.
Posted this morning, the advisory notes an "IPv6 Crafted Packet Vulnerabilty" in Cisco's Internetwork Operating System (IOS) that can open a router to "an arbitrary code execution attack." Cisco knew about the bug and issued a patch in April but without fanfare.
The flaw could be used to launch a denial-of-service attack, as is the case with most IOS vulnerabilities discovered lately. More chilling, though, is the "code execution" part, meaning that a hacker could take over the router completely (see Cisco Faces Security Flap).
The Cisco advisory notes that the attack only works if a router is "specifically configured" for IPv6.
Cisco and ISS had sponsored Lynn's talk but at the last minute asked him to change topics. Lynn didn't comply, quitting his ISS job just before going on stage to demonstrate the security flaw. He did not reveal details of how to exploit the flaw.
Since then, Cisco and ISS have been granted a court order preventing Lynn and the Black Hat organizers from further discussing the flaw. "Cisco and ISS were granted a permanent injunction against Michael Lynn and Black Hat on terms that all parties agreed to," a Cisco spokesman says.
Lynn might also face an FBI investigation, according to some reports.
— Craig Matsumoto, Senior Editor, Light Reading
Posted this morning, the advisory notes an "IPv6 Crafted Packet Vulnerabilty" in Cisco's Internetwork Operating System (IOS) that can open a router to "an arbitrary code execution attack." Cisco knew about the bug and issued a patch in April but without fanfare.
The flaw could be used to launch a denial-of-service attack, as is the case with most IOS vulnerabilities discovered lately. More chilling, though, is the "code execution" part, meaning that a hacker could take over the router completely (see Cisco Faces Security Flap).
The Cisco advisory notes that the attack only works if a router is "specifically configured" for IPv6.
Cisco and ISS had sponsored Lynn's talk but at the last minute asked him to change topics. Lynn didn't comply, quitting his ISS job just before going on stage to demonstrate the security flaw. He did not reveal details of how to exploit the flaw.
Since then, Cisco and ISS have been granted a court order preventing Lynn and the Black Hat organizers from further discussing the flaw. "Cisco and ISS were granted a permanent injunction against Michael Lynn and Black Hat on terms that all parties agreed to," a Cisco spokesman says.
Lynn might also face an FBI investigation, according to some reports.
— Craig Matsumoto, Senior Editor, Light Reading
EDUCATIONAL RESOURCES



FEATURED VIDEO
UPCOMING LIVE EVENTS
April 6-4, 2023, Virtual Event
April 25-27, 2023, Virtual Event
May 10, 2023, Virtual Event
May 15-17, 2023, Austin, TX
May 23, 2023, Digital Symposium
June 6-8, 2023, Digital Symposium
June 21, 2023, Digital Symposium
December 6-7, 2023, New York City
UPCOMING WEBINARS
March 28, 2023
A 5G Transport Inflection Point: What’s Next?
March 29, 2023
Will Your Open RAN Deployment Meet User Expectations?
March 29, 2023
Are Your Cable/Fixed/FTTX Customers Impacted by Outages?
March 30, 2023
Taking the next step with Wi-Fi 6E
April 4, 2023
RAN Evolution Digital Symposium - Day 1
April 6, 2023
RAN Evolution Digital Symposium - Day 2
April 12, 2023
Harnessing the Power of Location Data
April 20, 2023
SCTE® LiveLearning for Professionals Webinar™ Series: Getting A Fix on Fixed Wireless
Webinar Archive
PARTNER PERSPECTIVES - content from our sponsors
Cellnex Poland readies for 5G/5.5G with Huawei’s Long Reach E-band
By Ken Wieland, Light Reading Contributing Editor
WBBA Director General: Creating a Roadmap for Broadband Advocacy
By Pedro Pereira
Why Digital Transformation Is Crucial For Carriers
By Kevin Casey
All Partner Perspectives