Incident: Cisco Enterprise Products Vulnerable to Exploitable Flaws.

Published Date: 2020-02-05

Postmortem Analysis
Timeline 1. The software failure incident with vulnerabilities in Cisco enterprise products was reported in the article published on 2020-02-05 [95919]. Therefore, the software failure incident with vulnerabilities in Cisco enterprise products happened in February 2020.
System 1. Cisco enterprise products, including desk phones, web cameras, and network switches [95919]
Responsible Organization 1. Researchers at Armis were responsible for discovering the vulnerabilities in Cisco enterprise products that could be exploited to penetrate corporate networks [95919].
Impacted Organization 1. Corporate networks [95919]
Software Causes 1. The software causes of the failure incident were the recently discovered flaws in Cisco enterprise products, including desk phones, web cameras, and network switches, which could be exploited to penetrate deep into corporate networks [95919].
Non-software Causes 1. Vulnerabilities in Cisco enterprise products such as desk phones, web cameras, and network switches [95919].
Impacts 1. The software failure incident in Cisco enterprise products, specifically in desk phones, web cameras, and network switches, allowed attackers to penetrate deep into corporate networks, potentially compromising sensitive information and causing widespread issues [95919]. 2. Attackers could exploit the vulnerabilities to intercept large amounts of unencrypted internal information, move between different parts of a target's system, shut down devices, or turn them into surveillance tools within a target organization [95919]. 3. The vulnerabilities in the Cisco Discovery Protocol implementation could be used to automatically and simultaneously target many devices at once, take over crucial devices like network switches, and move laterally within a system [95919]. 4. The software failure incident raised concerns about the security of enterprise IoT devices, with previous instances of state-sponsored hackers targeting office IoT devices to infiltrate corporate networks [95919]. 5. While patches were released by Cisco to address the vulnerabilities, manual patching is required for most vulnerable devices, especially enterprise switches and routers, which can be challenging and may cause network downtime [95919].
Preventions 1. Timely Patching: Regularly applying software patches and updates could have prevented the software failure incident by addressing the vulnerabilities in the Cisco products [95919]. 2. Network Segmentation: Implementing robust network segmentation practices could have limited the impact of the vulnerabilities in the Cisco products, making it harder for attackers to move laterally within the network [95919]. 3. Disabling CDP: Disabling the Cisco Discovery Protocol (CDP) on devices like switches could have been a preventive measure to mitigate the risks associated with the vulnerabilities in the CDP implementation [95919].
Fixes 1. Cisco has released patches for all five vulnerabilities found by Armis in the Cisco Discovery Protocol implementation of several Cisco products [95919]. 2. Companies can manually patch vulnerable devices like switches and routers to receive protection [95919]. 3. Other mitigations include disabling CDP on devices like switches, although this may lead to other issues [95919].
References 1. Researchers at Armis [95919] 2. Ben Seri, vice president of research at Armis [95919] 3. Ang Cui, founder of Red Balloon [95919] 4. Cisco spokesperson [95919] 5. Microsoft researchers [95919] 6. Department of Homeland Security [95919]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization (a) The software failure incident has happened again at one_organization: - The incident occurred with Cisco enterprise products like desk phones, web cameras, and network switches [95919]. - Researchers discovered flaws in Cisco products that could be exploited to penetrate deep into corporate networks [95919]. - The vulnerabilities were found in the implementation of the Cisco Discovery Protocol, impacting millions of Cisco devices [95919]. - Armis disclosed the vulnerabilities to Cisco, which then released patches for all five vulnerabilities [95919]. - There is a history of researchers discovering CDP vulnerabilities in Cisco products, prompting the need for fixes before exploitation [95919]. (b) The software failure incident has happened again at multiple_organization: - The article does not mention similar incidents happening at other organizations or with their products and services.
Phase (Design/Operation) design (a) The software failure incident described in the article is related to the design phase. The vulnerabilities in Cisco enterprise products, such as desk phones, web cameras, and network switches, were due to flaws in the implementation of the Cisco Discovery Protocol (CDP), which is a design aspect of the network devices. The flaws in CDP allowed attackers to exploit the system and penetrate deep into corporate networks, impacting millions of devices [95919]. (b) The software failure incident is not related to the operation phase or misuse of the system.
Boundary (Internal/External) within_system, outside_system (a) The software failure incident reported in the article is primarily within_system. The vulnerabilities in Cisco enterprise products, specifically in the implementation of the Cisco Discovery Protocol (CDP), allowed attackers to exploit flaws within the system to penetrate deep into corporate networks [95919]. The vulnerabilities in CDP, a Layer 2 protocol used by Cisco products, provided an efficient route for attackers to target and compromise multiple Cisco devices simultaneously once they gained a foothold inside a network. The flaws in CDP allowed attackers to move laterally within a system, intercept unencrypted network data, and potentially access sensitive information like a company's "active directory" [95919]. The article highlights that the vulnerabilities were found by the enterprise security firm Armis, who disclosed their findings to Cisco, leading to the release of patches for all five vulnerabilities by Cisco [95919]. (b) The software failure incident also has elements of outside_system factors contributing to the vulnerability. The article mentions that the vulnerabilities in Cisco products, such as desk phones, web cameras, and network switches, could be exploited by attackers to penetrate deep into corporate networks. This highlights the external threat posed by attackers who could exploit the vulnerabilities in Cisco products to gain unauthorized access to sensitive information within a network [95919]. Additionally, the article references previous instances of suspected state-sponsored Russian hackers targeting office IoT devices to infiltrate corporate networks, indicating external threats targeting enterprise networks [95919].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case is primarily due to non-human actions, specifically vulnerabilities in the Cisco Discovery Protocol implementation in Cisco products [95919]. These vulnerabilities were discovered by the enterprise security firm Armis and could be exploited by attackers to penetrate deep into corporate networks, compromising multiple devices simultaneously. The flaws in the implementation of the Cisco Discovery Protocol allowed attackers to exploit the network's "Layer 2" and move laterally within the network, intercepting unencrypted data and potentially taking over crucial devices like network switches [95919]. (b) Human actions also play a role in this software failure incident as researchers like those at Armis and Ang Cui have been actively discovering and disclosing vulnerabilities in the Cisco products to prompt fixes before exploitation occurs [95919]. Additionally, the need for manual patching of vulnerable devices highlights the importance of human intervention in ensuring the security of enterprise networks [95919].
Dimension (Hardware/Software) hardware, software (a) The software failure incident reported in the article is related to hardware vulnerabilities in Cisco enterprise products such as desk phones, web cameras, and network switches [95919]. These vulnerabilities in the hardware devices could be exploited to penetrate deep into corporate networks, impacting millions of devices. The flaws were found in the implementation of the Cisco Discovery Protocol (CDP), a mechanism that allows Cisco products to broadcast their identities within a private network. Attackers could exploit these hardware vulnerabilities to intercept unencrypted internal information, move between different parts of a target's system, and potentially take over crucial devices like network switches [95919]. (b) The software failure incident is also related to software vulnerabilities in the implementation of the Cisco Discovery Protocol (CDP) in Cisco products [95919]. The vulnerabilities in the software allowed attackers to exploit the CDP to automatically and simultaneously target many devices at once, compromising one vulnerable Cisco device after another to bore deeper into a system. The software flaws in CDP provided an efficient route for attackers to attack ubiquitous Cisco products, leading to the discovery of related bugs throughout the disclosure process [95919].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the article is malicious in nature. Researchers discovered flaws in Cisco enterprise products that could be exploited by attackers to penetrate deep into corporate networks, intercept unencrypted internal information, and take over crucial devices like network switches [95919]. The vulnerabilities found by the enterprise security firm Armis could allow attackers to target batches of Cisco devices at once to shut them down or turn them into eyes and ears inside a target organization. Concerns about state-sponsored hackers attacking office IoT devices to infiltrate corporate networks have also been raised [95919]. The Department of Homeland Security has warned about the importance of defending enterprise network infrastructure [95919]. (b) The software failure incident is non-malicious in the sense that the vulnerabilities were not intentionally introduced to harm the system. The flaws lie in the implementation of the Cisco Discovery Protocol, which is used by Cisco products to broadcast their identities within a private network. Armis disclosed its findings to Cisco, and the networking giant is releasing patches for all five vulnerabilities to address the issues [95919]. The article mentions that there is a history of researchers discovering CDP vulnerabilities and calling attention to them so that Cisco can fix them before they are exploited or to minimize exploitation [95919].
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident: The software failure incident related to the vulnerabilities in Cisco enterprise products was not due to accidental decisions but rather poor decisions. The vulnerabilities were a result of flaws in the implementation of the Cisco Discovery Protocol (CDP), which allowed attackers to exploit these devices and penetrate deep into corporate networks. The use of CDP, a proprietary protocol by Cisco, created an easy way for attackers to find and target Cisco products within a network, making it a poor decision in terms of network security [95919].
Capability (Incompetence/Accidental) accidental (a) The software failure incident reported in the article is not attributed to development incompetence. The vulnerabilities in Cisco enterprise products were discovered by the enterprise security firm Armis, and Cisco has worked to release patches for all five vulnerabilities [95919]. (b) The software failure incident in the article is related to accidental factors. The vulnerabilities in Cisco products, specifically in the implementation of the Cisco Discovery Protocol, were discovered by Armis and were not intentionally introduced by the development organization. These vulnerabilities could be exploited by attackers to penetrate deep into corporate networks [95919].
Duration permanent (a) The software failure incident described in the article is more of a permanent nature. The vulnerabilities in Cisco enterprise products, specifically in the implementation of the Cisco Discovery Protocol (CDP), could potentially allow attackers to exploit these flaws to penetrate deep into corporate networks. These vulnerabilities impact millions of devices and could be used to intercept unencrypted internal information, compromise crucial devices like network switches, and move laterally within a system [95919]. The article also mentions that there is a history of researchers discovering CDP vulnerabilities over decades, highlighting the ongoing nature of such vulnerabilities and the need for continuous vigilance and patching to prevent exploitation [95919].
Behaviour value, other (a) crash: The software failure incident described in the article is not related to a crash where the system loses state and does not perform any of its intended functions. Instead, the vulnerabilities in Cisco enterprise products could be exploited to penetrate deep into corporate networks [95919]. (b) omission: The software failure incident is not related to a system omitting to perform its intended functions at an instance(s). The vulnerabilities found in Cisco products could allow attackers to target vulnerable devices and compromise them to bore deeper into a system [95919]. (c) timing: The software failure incident is not related to the system performing its intended functions correctly but too late or too early. It is about vulnerabilities in Cisco products that could be exploited to intercept unencrypted network data and access a company's "active directory" [95919]. (d) value: The software failure incident is related to the system performing its intended functions incorrectly. The vulnerabilities found in Cisco enterprise products could be exploited to cause widespread issues, intercept internal information, and take over crucial devices like network switches [95919]. (e) byzantine: The software failure incident is not related to the system behaving erroneously with inconsistent responses and interactions. It is about vulnerabilities in Cisco products that could be exploited by attackers to move laterally within a network and compromise multiple devices simultaneously [95919]. (f) other: The software failure incident involves vulnerabilities in the implementation of the Cisco Discovery Protocol, which allows attackers to find Cisco products within a network easily once they are inside. This creates an efficient route for attackers to target and compromise Cisco devices, potentially leading to a complete takeover of the network [95919].

IoT System Layer

Layer Option Rationale
Perception sensor, actuator, processing_unit, network_communication, embedded_software (a) sensor: The software failure incident reported in the article is related to vulnerabilities in Cisco enterprise products like desk phones, web cameras, and network switches. These vulnerabilities could be exploited to penetrate deep into corporate networks, indicating a potential failure related to the sensor layer of the cyber physical system [95919]. (b) actuator: The vulnerabilities found in Cisco products could allow attackers to take over crucial devices like network switches and move laterally within a system. This suggests a potential failure related to the actuator layer of the cyber physical system, where attackers could compromise devices to control network functions [95919]. (c) processing_unit: The vulnerabilities in the Cisco Discovery Protocol implementation of several Cisco products could be exploited to intercept unencrypted network data and access a company's "active directory," which manages authentication for users and devices. This indicates a potential failure related to the processing unit layer of the cyber physical system, where attackers could gain unauthorized access to sensitive information [95919]. (d) network_communication: The vulnerabilities in Cisco products could allow attackers to move between different parts of a target's system, intercept internal information, and target batches of devices simultaneously. This points to a potential failure related to the network communication layer of the cyber physical system, where attackers could exploit weaknesses in communication protocols to compromise devices and data flow [95919]. (e) embedded_software: The vulnerabilities found in the Cisco products were related to flaws in the implementation of the Cisco Discovery Protocol, which is part of the network's "Layer 2" and establishes the foundational data link between network devices. This indicates a potential failure related to the embedded software layer of the cyber physical system, where vulnerabilities in proprietary protocols can be exploited to compromise devices and network security [95919].
Communication link_level The software failure incident reported in Article 95919 is related to the communication layer of the cyber physical system that failed at the link_level. The vulnerabilities discovered in Cisco enterprise products, specifically in the implementation of the Cisco Discovery Protocol (CDP), which operates at Layer 2 of the network, allowed attackers to exploit these flaws to penetrate deep into corporate networks. The CDP vulnerabilities provided an efficient route to attacking ubiquitous Cisco products, such as network switches, desk phones, and web cameras, by allowing attackers to move laterally within the network and intercept unencrypted network data. The flaws in CDP created an easy way for attackers to find and target Cisco products once inside a network, potentially compromising multiple devices simultaneously [95919].
Application TRUE The software failure incident reported in the article [95919] is related to vulnerabilities found in Cisco enterprise products, such as desk phones, web cameras, and network switches. These vulnerabilities were discovered by the enterprise security firm Armis and are related to the implementation of the Cisco Discovery Protocol (CDP), which is a Layer 2 protocol used by Cisco products to broadcast their identities within a private network. The vulnerabilities in the CDP implementation could be exploited by attackers to penetrate deep into corporate networks, intercept unencrypted internal information, and move between different parts of a target's system. These vulnerabilities could allow attackers to target batches of Cisco devices simultaneously, compromising their security. While the article does not explicitly mention that the failure was related to the application layer of the cyber physical system, it does highlight the vulnerabilities in the network equipment, which could be considered as a failure due to contributing factors introduced by bugs and incorrect usage, falling under the application layer of the cyber physical system.

Other Details

Category Option Rationale
Consequence harm, property, non-human, theoretical_consequence (b) harm: The software failure incident involving vulnerabilities in Cisco enterprise products could lead to physical harm as attackers could exploit the flaws to intercept unencrypted internal information, access a company's "active directory," and compromise devices like desk phones and webcams to potentially turn them into eyes and ears inside a target organization [95919].
Domain information [a] The failed system in this incident is related to the industry of information technology and network equipment, specifically Cisco enterprise products like desk phones, web cameras, and network switches [95919].

Sources

Back to List