Cisco Unified Wireless IP Phone 7921 Does Not Validate Sever Certificates When Using PEAP
SecurityTracker Alert ID: 1019494|
SecurityTracker URL: http://securitytracker.com/id/1019494
(Links to External Site)
Updated: Mar 19 2008|
Original Entry Date: Feb 25 2008
Host/resource access via network|
Vendor Confirmed: Yes |
Version(s): Model 7921|
A vulnerability was reported in Cisco Unified Wireless IP Phone model 7921. A remote user can determine the installation path.|
When configured to use Protected Extensible Authentication Protocol (PEAP), the phone does not validate server certificates.
A remote user may be able to conduct a man-in-the-middle attack.
The original advisory is available at:
George Ou reported this vulnerability.
The device does not validate server certificates.|
No solution was available at the time of this entry.|
The vendor plans to issue a fix.
Cisco recommends, as a workaround, using EAP-TLS as an alternative.
Vendor URL: www.cisco.com/ (Links to External Site)
Source Message Contents
Subject: [Full-disclosure] Cisco confirms vulnerability in 7921 Wi-Fi IP|
Two days after news of the Vocera Wi-Fi VoIP communicator PEAP security
bypass vulnerability, I received confirmation from Cisco that their
7921 Wi-Fi VoIP phone is also vulnerable to the same issue where digital
certificates aren't cryptographically verified. Both Cisco and Vocera
have told me that they intend to fix future implementations of PEAP and
do the necessary steps to ensure certificate authenticity. Cisco
released the following statement.
"Cisco confirms that the Cisco wireless IP phone model 7921 does not
currently validate server certificates when configured to use PEAP
(MS-CHAPv2). The Cisco 7920 model does not support PEAP. Cisco is
planning a long term solution to enable the option of client-side
validation of server certificates with PEAP; however, we do not
currently have a time line for when a software upgrade will be
available. To work around the problem, administrators can configure
EAP-TLS as an alternative to PEAP while ensuring mutual client-server
Details at http://blogs.zdnet.com/security/?p=901
George Ou, CISSP
ZDNet Editor at Large (CNET Networks)
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/