Incident: 'Critical Cisco Flaw Allows Trust Anchor Disabling, Email Risk'

Published Date: 2019-05-14

Postmortem Analysis
Timeline 1. The software failure incident happened in May 2019. [84810]
System 1. Trust Anchor on Cisco routers [84810]
Responsible Organization 1. Hackers exploited serious vulnerabilities affecting dozens of Cisco devices, allowing them to deceive the hardware that checks software updates [84810].
Impacted Organization 1. Employees sending emails within the organization were impacted as their emails were put at risk due to compromised routers [84810]. 2. Cisco as a company was impacted by the software failure incident as it had to work on software fixes for all affected hardware and faced potential financial costs [84810].
Software Causes 1. The software vulnerability allowed hackers to deceive the part of the product hardware that checks whether software updates come from legitimate sources, potentially compromising the Trust Anchor on Cisco routers [84810]. 2. The flaw in Cisco devices enabled hackers to make arbitrary changes to the routers while still reporting the device as trustworthy, indicating a software vulnerability in the Trust Anchor system [84810].
Non-software Causes 1. The vulnerability exploited by hackers involved making changes to a piece of hardware called the Trust Anchor on a Cisco router, indicating a hardware-based vulnerability [84810].
Impacts 1. Emails sent within an organization were put at risk due to compromised routers, potentially exposing sensitive information [84810]. 2. The vulnerability allowed hackers to disable the Trust Anchor on Cisco routers, enabling them to make arbitrary changes to the devices without detection [84810]. 3. The incident raised concerns about the inability to easily verify if a device has been hacked, leading to uncertainty about the extent of the affected devices and potential financial costs for Cisco [84810].
Preventions 1. Implementing a "read only" configuration for critical security functions in hardware could have prevented the software failure incident as it would make it harder for hackers to alter the code in the chip [84810].
Fixes 1. Cisco is working on "software fixes" for all affected hardware [84810]. 2. The fix for the software vulnerability may require "on-premise reprogramming" of the affected hardware [84810].
References 1. Security researchers at Red Balloon Security [84810] 2. Chief executive Ang Cui of Red Balloon Security [84810] 3. Wired magazine [84810] 4. Prof Alan Woodward, computer security expert based at Surrey University [84810] 5. Security expert Andrew Tierney of Pen Test partners [84810] 6. Cisco's website [84810]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to the Cisco flaw has happened again within the same organization. The article mentions that security researchers discovered serious vulnerabilities affecting dozens of Cisco devices, allowing hackers to deceive the hardware that checks software updates' legitimacy. This incident specifically targeted the Trust Anchor on one Cisco router, indicating an internal software failure within Cisco products [84810]. (b) The software failure incident has also affected multiple organizations. The vulnerability in Cisco devices could potentially put emails sent within organizations at risk if they use compromised routers. Since Cisco products are widely used across various organizations, the impact of this software failure could extend beyond just one company, affecting multiple organizations that rely on Cisco hardware for their network infrastructure [84810].
Phase (Design/Operation) design, operation (a) The software failure incident in the article is related to the design phase. The vulnerability affecting Cisco devices was due to flaws that allowed hackers to deceive the part of the product hardware that checks whether software updates come from legitimate sources. This design flaw could potentially put emails sent within an organization at risk as compromised routers may be used for internal communications [84810]. (b) The software failure incident in the article is also related to the operation phase. The article mentions that security experts believe the vulnerability could cause a major headache for Cisco, as it is unclear how many devices could have been affected, and it's unlikely Cisco can determine the extent of the impact. Additionally, the article highlights that regular users may not be able to check whether their device has been hacked or secure a compromised device, indicating operational challenges in detecting and mitigating the issue [84810].
Boundary (Internal/External) within_system (a) within_system: The software failure incident reported in the articles is primarily within the system. The vulnerability affecting Cisco devices was due to flaws that allowed hackers to deceive the part of the product hardware responsible for checking software updates from legitimate sources. This vulnerability was exploited by targeting and making changes to a piece of hardware called the Trust Anchor on a Cisco router, allowing arbitrary changes to be made while still reporting the device as trustworthy. The incident highlights a critical security flaw within the design of Cisco products, indicating that the failure originated from within the system itself [84810]. (b) outside_system: The software failure incident does not indicate any contributing factors originating from outside the system. The vulnerabilities and flaws discovered in Cisco devices were exploited by hackers within the system, indicating that the failure was primarily due to factors within the system itself [84810].
Nature (Human/Non-human) non-human_actions (a) The software failure incident in Article 84810 was primarily due to non-human actions. Security researchers discovered serious vulnerabilities in Cisco devices that allowed hackers to deceive the hardware responsible for checking software updates' legitimacy. This flaw could potentially put emails sent within an organization at risk as compromised routers may be used. The vulnerability was exploited by targeting and making changes to a piece of hardware called the Trust Anchor on a Cisco router, demonstrating the ability to disable it quietly and persistently, allowing arbitrary changes to the router without detection [84810]. (b) The article does not provide specific information about the software failure incident being caused by human actions.
Dimension (Hardware/Software) hardware, software (a) The software failure incident in the provided article is related to hardware. The vulnerability discovered by Red Balloon Security researchers allowed them to target and make changes to a piece of hardware called the Trust Anchor on a Cisco router. This vulnerability enabled them to disable the Trust Anchor, which is a hardware component, and make arbitrary changes to the router while still reporting the device as trustworthy. This hardware vulnerability could potentially affect numerous Cisco devices, leading to concerns about the security of emails sent within organizations [84810]. (b) The software failure incident also involves software issues as Cisco is working on "software fixes" for all affected hardware. The flaw in the software allows hackers to deceive the hardware component responsible for checking the legitimacy of software updates. The need for software fixes indicates that the software itself has vulnerabilities that need to be addressed to mitigate the risks posed by the hardware vulnerability exploited by the hackers [84810].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in Article 84810 is malicious in nature. Security researchers discovered serious vulnerabilities in Cisco devices that allow hackers to deceive the hardware responsible for checking software updates from legitimate sources. The vulnerability was exploited to target and disable the Trust Anchor on a Cisco router, enabling arbitrary changes to be made to the device without detection. This malicious activity could potentially compromise the security of emails sent within organizations using the affected routers, posing a significant risk. The incident highlights the intentional actions of hackers to exploit software vulnerabilities for harmful purposes [84810]. (b) The software failure incident in Article 84810 does not involve non-malicious factors. The vulnerabilities identified in Cisco devices were exploited by hackers to manipulate the Trust Anchor and compromise the security of the routers. The incident does not stem from unintentional errors, faults, or defects in the software but rather from deliberate actions aimed at undermining the security and integrity of the affected devices. Therefore, the failure incident is primarily characterized by malicious intent rather than non-malicious contributing factors [84810].
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident described in the articles seems to be related to poor decisions. Security experts and researchers highlighted that the vulnerability affecting Cisco devices was due to a questionable design decision by Cisco. Specifically, the flaw allowed hackers to deceive the hardware responsible for checking software updates' legitimacy, potentially compromising the security of emails within organizations. Additionally, experts pointed out that most companies typically use hardware with critical security functions in a "read only" configuration to prevent such vulnerabilities, indicating a poor decision on Cisco's part not to implement this measure [84810].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident in Article 84810 can be attributed to development incompetence. The vulnerability affecting Cisco devices was due to a flaw that allowed hackers to deceive the part of the product hardware responsible for checking software updates from legitimate sources. This flaw was exploited by security researchers to target and make changes to a piece of hardware called the Trust Anchor on a Cisco router. The fact that such a critical security function could be altered in Cisco's products raised concerns about the design decisions made by the company and the potential impact on device security [84810]. (b) The software failure incident in Article 84810 does not seem to be related to an accidental factor. The vulnerability exploited by the security researchers was a result of a deliberate flaw in the hardware design that allowed for unauthorized changes to be made to the Trust Anchor on Cisco routers. The incident was not described as accidental but rather as a serious vulnerability that could have significant implications for device security [84810].
Duration permanent The software failure incident described in the article [84810] seems to fall under the category of a permanent failure. The vulnerability discovered in Cisco devices allows hackers to deceive the hardware responsible for checking software updates, potentially compromising the security of emails sent within organizations. The article mentions that the Trust Anchor on Cisco routers can be disabled persistently, allowing for arbitrary changes to be made to the device without detection. This indicates a fundamental flaw in the design of the hardware that could have long-lasting implications, as fixing the issue requires on-premise reprogramming of the affected hardware, suggesting a permanent impact on the affected devices.
Behaviour crash, omission, value, other (a) crash: The software failure incident in the article can be related to a crash behavior. The vulnerability discovered in Cisco devices allowed hackers to deceive the part of the product hardware that checks whether software updates come from legitimate sources, leading to the Trust Anchor being disabled on a Cisco router, which is a critical security function. This crash behavior resulted in the system losing its state and not performing its intended functions properly [84810]. (b) omission: The software failure incident can also be associated with an omission behavior. The vulnerability in the Cisco devices allowed hackers to make changes to the Trust Anchor on a router, which could lead to the system omitting to perform its intended security functions, potentially putting emails sent within an organization at risk [84810]. (c) timing: The timing behavior is not explicitly mentioned in the article. (d) value: The software failure incident can be linked to a value behavior. The vulnerability in the Cisco devices allowed hackers to alter the Trust Anchor on a router, causing the system to perform its security functions incorrectly by reporting the device as trustworthy even after unauthorized changes had been made. This incorrect behavior could compromise the security of the devices [84810]. (e) byzantine: The byzantine behavior is not explicitly mentioned in the article. (f) other: The software failure incident can be associated with another behavior, which is a questionable design decision by Cisco. Security experts mentioned that most companies use hardware where critical security functions exist in a "read only" configuration, meaning that the code in the chip cannot be altered once manufactured. However, Cisco's design decision not to implement this read-only configuration raised concerns and was considered a questionable design choice that contributed to the vulnerability [84810].

IoT System Layer

Layer Option Rationale
Perception embedded_software (a) sensor: The software failure incident reported in the article is not directly related to a sensor error. It focuses on vulnerabilities in Cisco devices that allow hackers to deceive the part of the product hardware that checks whether software updates come from legitimate sources [84810]. (b) actuator: The software failure incident does not mention any issues related to actuator errors. It primarily discusses vulnerabilities in Cisco devices that could be exploited by hackers to make changes to the Trust Anchor on routers [84810]. (c) processing_unit: The article does not specifically mention any failures related to the processing unit of the cyber-physical system. It mainly discusses vulnerabilities in Cisco devices that could lead to unauthorized changes in the hardware [84810]. (d) network_communication: The software failure incident is related to vulnerabilities in Cisco devices that could be exploited by hackers to deceive the hardware responsible for checking software updates, potentially compromising emails sent within an organization [84810]. (e) embedded_software: The failure incident involves a vulnerability in Cisco devices that allows hackers to target and make changes to the Trust Anchor, indicating a potential issue with embedded software security [84810].
Communication link_level The software failure incident reported in Article 84810 is related to the communication layer of the cyber physical system that failed at the link_level. The vulnerability discovered in Cisco devices allowed hackers to deceive the part of the product hardware that checks whether software updates come from legitimate sources, potentially compromising the Trust Anchor on Cisco routers. This indicates a failure at the link_level, which is the physical layer of the communication system [84810].
Application FALSE The software failure incident reported in Article 84810 was not related to the application layer of the cyber physical system. Instead, it was related to serious vulnerabilities affecting Cisco devices, specifically involving the Trust Anchor on one Cisco router. The vulnerability allowed hackers to deceive the part of the product hardware that checks whether software updates come from legitimate sources, indicating a flaw at the hardware level rather than the application layer [84810].

Other Details

Category Option Rationale
Consequence theoretical_consequence (a) death: People lost their lives due to the software failure (b) harm: People were physically harmed due to the software failure (c) basic: People's access to food or shelter was impacted because of the software failure (d) property: People's material goods, money, or data was impacted due to the software failure (e) delay: People had to postpone an activity due to the software failure (f) non-human: Non-human entities were impacted due to the software failure (g) no_consequence: There were no real observed consequences of the software failure (h) theoretical_consequence: There were potential consequences discussed of the software failure that did not occur (i) other: Was there consequence(s) of the software failure not described in the (a to h) options? What is the other consequence(s)? The articles do not mention any consequences related to death, harm, basic needs, property loss, or non-human entities resulting from the software failure incident. The focus is primarily on the vulnerability discovered in Cisco devices and the potential risks to email security within organizations. The articles discuss the potential financial impact on Cisco due to the vulnerability and the challenges in verifying and securing affected devices.
Domain information (a) The software failure incident reported in the articles is related to the information industry. The vulnerability discovered in Cisco devices could potentially put emails sent within an organization at risk, as they may use compromised routers [Article 84810].

Sources

Back to List