cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2946
Views
0
Helpful
1
Comments
Omar Santos
Cisco Employee
Cisco Employee

Microsoft published a security advisory providing guidance to increase the security for communications between LDAP clients and Active Directory domain controllers. The document introduced the use of LDAP channel binding and LDAP signing.

"Microsoft recommends administrators make the hardening changes described in ADV190023 because when using default settings, an elevation of privilege vulnerability exists in Microsoft Windows that could allow a man-in-the-middle attacker to successfully forward an authentication request to a Windows LDAP server, such as a system running AD DS or AD LDS, which has not configured to require signing or sealing on incoming connections.  The security of a directory server can be significantly improved by configuring the server to reject Simple Authentication and Security Layer (SASL) LDAP binds that do not request signing (integrity verification) or to reject LDAP simple binds that are performed on a clear text (non-SSL/TLS-encrypted) connection. SASLs may include protocols such as the Negotiate, Kerberos, NTLM, and Digest protocols. Unsigned network traffic is susceptible to replay attacks in which an intruder intercepts the authentication attempt and the issuance of a ticket. The intruder can reuse the ticket to impersonate the legitimate user. Additionally, unsigned network traffic is susceptible to man-in-the-middle attacks in which an intruder captures packets between the client and the server, changes the packets, and then forwards them to the server. If this occurs on an LDAP server, an attacker can cause a server to make decisions that are based on forged requests from the LDAP client."

Cisco strongly advises customers to enable LDAP channel binding and LDAP signing to increase the security of their Windows LDAP implementations. A Windows Update will be released by Microsoft in March 2020 for all supported Windows platforms and will enable LDAP channel binding and LDAP signing on Active Directory servers by default.
Customers can also subscribe to the Cisco Talos blog to obtain more information about industry vulnerability mitigations and protections.
Comments
It will be great if Cisco release advisory on same with all affected product , I can see for Voice software advisory released. https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/trouble/12_5_1/fieldNotice/cucm_b_fn-secure-ldap-mandatory-ad.html But for security appliances and other product we are not seeing similar software Advisory, for example ESA , WSA both affected (i came to know while working with customer case few days ago ), ISE there is reported bug https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs67071. It would be great if cisco release complete list of the affected product. Thanks
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: