Furor over Cisco IOS router exploit erupts at Black Hat
Cisco and ISS filed lawsuits against Michael Lynn and the Black Hat conference
Network World - The decision by Internet Security Systems Inc. (ISS) research analyst Michael Lynn to speak at this week's Black Hat USA conference about how unpatched Cisco routers can be remotely compromised has ignited a spate of lawsuits against Lynn and the conference.
Although Cisco Systems Inc. and ISS abruptly canceled Lynn's planned technical talk and demo, the researcher went ahead with the talk anyway (see ISS researcher quits job to detail Cisco flaws). Lynn, who originally uncovered the problem, was asked to resign after his presentation but said he felt compelled to reveal the information. "I felt I had to do what's right for the country and the national infrastructure," he said.
Cisco and ISS, claiming it was premature to release the research, saw it differently and immediately filed a lawsuit to stop him from discussing the subject further. The Black Hat Conference was also served with a lawsuit by the two companies for allowing Lynn to discuss the exploits.
Black Hat CEO Jeff Moss yesterday said he felt trapped in the middle. "Michael Lynn said he was going to discuss VoIP," said Moss. "I can't control a speaker who changes his topic in the middle of a presentation."
Told by ISS not to discuss the router exploit, Lynn began his presentation at Black Hat yesterday with a substitute presentation on voice over IP. But boos from the audience -- which had come for his original topic, "The Holy Grail: Cisco IOS Shellcode and Remote Execution" -- prompted him to talk about how an attacker can take control of a Cisco router through a variety of buffer overflow attacks and shellcode exploits.
While such an attack is common against unpatched servers -- several destructive Internet worms in past years have used buffer overflow attacks to take over Microsoft-based servers -- this is believed to be the first demonstration of a buffer overflow attack against Cisco routers.
Lynn did not publicly offer the specific code to carry out the attack -- which he said could be accomplished in several ways on unpatched Cisco routers -- but he provided evidence it could be done. Lynn said he got some of his insights by reading information posted on Chinese hacker sites.
ISS just last week stated that it had intended to provide a "first" in this security area, but by Monday, discussions with Cisco -- which had been expected to participate in the Black Hat presentation -- ended up with the two firms abruptly canceling the talk on Monday.
In addition, Cisco warned Black Hat organizers that if they did not remove
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!