09-13-2012 04:32 AM - edited 03-01-2019 05:36 PM
We have a vulnerability scanner that we use and it has picked up that our Voice GW has a "Cisco IPv6 Crafted Packet Vulnerability"
I entered the commands "no ipv6 unicast-routing" and "no ipv6 cef" the next scan is in a weeks time, but would these have done the trick?
Thank you
Bilal
Solved! Go to Solution.
10-22-2012 05:58 PM
The "null 0" interface is the equivalent of /dev/null in unix. It is a write-only interface used to discard packets quickly. There are cases where routing a packet to the null inetrface is the fastest way to discard it.
As a write only interface, there should be no kind of vulnerability associated with it.
There may be a cometic bug that the interface is visiable at all, but functionally speaking there is no real inetrface running IPv6 in this configuration.
10-01-2012 01:45 PM
Which scanner are you using, and how did it determine the vulnerability?
If IPv6 is disabled, there should be no issue.
10-02-2012 12:57 AM
Qualys vulnerability scanner, the version of ios is vg224-i6k9s-mz.124-24.T5.bin
The report states:
A vulnerability exists in the processing of IPv6 packets. Crafted packets from the local segment received on logical interfaces (that is, tunnels including 6to4 tunnels) as well as physical interfaces can trigger this vulnerability. Crafted packets cannot traverse a 6to4 tunnel and attack a box across the tunnel.
The crafted packet must be sent from a local network segment to trigger the attack. This vulnerability cannot be exploited one or more hops from the IOS device.
NOTE: This check requires that the "Clear Text Password" check box is enabled in your Authentication Preferences.
Successful exploitation of the vulnerability on Cisco IOS-XR may result in a restart of the IPv6 neighbor discovery process. A restart of this process will only affect IPv6 traffic passing through the system. All other processes and traffic will be unaffected. Repeated exploitation could result in a sustained denial of service attack on IPv6 traffic.
Workaround:
In networks where IPv6 is not needed but enabled, disabling IPv6 processing on an IOS device will eliminate exposure to this vulnerability. On a router which is configured for IPv6, this must be done by issuing the command "no ipv6 enable" and "no ipv6 address" on each interface.
VG224-1(config)#no ipv6 enable
^
% Invalid input detected at '^' marker.
VG224-1(config)#int fa0/0
VG224-1(config-if)#no ipv6 enable
VG224-1(config-if)#int fa0/1
VG224-1(config-if)#no ipv6 enable
What does the note in bold mean? There's no check box in cli :-/
Thank you
10-03-2012 12:42 PM
Does it just scan the configuration information or does it actually test for the vulnerability by probing?
Does it refer to a specific Cisco Security Advisory?
Based on the text you included (which seems to be directly copied from Cisco documents without attribution), it sounds like this may be referring to:
http://www.cisco.com/en/US/products/csa/cisco-sa-20050126-ipv6.html
Which is an ancient vulnerability. 12.4T never had that bug.
I think your next call should be to Qualsys.
I don't understand the bold text either. That is the only text not lifted verbatim from the Cisco Security Advisory.
10-08-2012 07:17 AM
Hi Phillip,
The reply I got is the below:
So have I correctly disabled ipv6? :-/
Thanks for your help
10-08-2012 12:18 PM
Having said this I found the below - should have checked before. I cant actually see this interface in the show interface output.
VG224-1#show ipv6 route
IPv6 Routing Table - Default - 1 entries
Codes: C - Connected, L - Local, S - Static, U - Per-user Static route
R - RIP
L FF00::/8 [0/0]
via Null0, receive
VG224-1(config)# interface Null0
VG224-1(config-if)#no ipv6 ?
unreachables Enable sending of ICMP Unreachable messages
VG224-1(config-if)#ipv
VG224-1(config-if)#ipv6 ?
unreachables Enable sending of ICMP Unreachable messages
Do voice GW's use the Null 0 interface and for what purpose? There's no way of disabling ipv6 under the interface...?
10-22-2012 05:58 PM
The "null 0" interface is the equivalent of /dev/null in unix. It is a write-only interface used to discard packets quickly. There are cases where routing a packet to the null inetrface is the fastest way to discard it.
As a write only interface, there should be no kind of vulnerability associated with it.
There may be a cometic bug that the interface is visiable at all, but functionally speaking there is no real inetrface running IPv6 in this configuration.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide