Cisco warns of NetFlow appliance vulnerability

Cisco NetFlow appliances typically sit in campus and data center locations and monitor high-throughput Gigabit Ethernet networks.

Cisco today issued a security warning about a potential vulnerability in its NetFlow traffic monitoring device that could cause the system to lock-up.

Specifically, Cisco wrote: “A vulnerability in the Stream Control Transmission Protocol (SCTP) decoder of the Cisco NetFlow Generation Appliance (NGA) could allow an unauthenticated, remote attacker to cause the device to hang or unexpectedly reload, causing a denial of service (DoS) condition. The vulnerability is due to incomplete validation of SCTP packets being monitored on the NGA data ports. An attacker could exploit this vulnerability by sending malformed SCTP packets on a network that is monitored by an NGA data port. SCTP packets addressed to the IP address of the NGA itself will not trigger this vulnerability. An exploit could allow the attacker to cause the appliance to become unresponsive or reload, causing a DoS condition. User interaction could be needed to recover the device using the reboot command from the CLI.”

Cisco said the vulnerability, which it rated as High, affects NGA models 3140, 3240 and 3340 which typically sit in campus and data center locations and monitor high-throughput Gigabit Ethernet networks.

“The appliances can be deployed at key observation points such as the server access layer, fabric path domains, and Internet exchange points. Visibility is dramatically amplified when NGA is connected to multiple network devices, allowing Layer 2 and Layer 3 flows to be analyzed hop by hop, essential for security, capacity planning, and troubleshooting,” Cisco said of the devices.

Cisco said it has released software that address this vulnerability.

 

via:  networkworld


Save pagePDF pageEmail pagePrint page

Leave a Reply

Your email address will not be published. Required fields are marked *