cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
906
Views
0
Helpful
7
Replies

CUCM Vulnerability

J_Fub
Level 1
Level 1

Good Day,

Can anyone help with the solution to Threat of Anti DNS Pinning in CUCM?

Thanks.

2 Accepted Solutions

Accepted Solutions

Adam Pawlowski
VIP Alumni
VIP Alumni

In general the configuration of the HA Proxy or Tomcat is not accessible, it is configured within the appliance. Some of the controls that are available include setting minimum TLS, adjusting presented ciphers, and controlling session timeouts. Sometimes system behaviors are adjusted when operating in a compliance mode like FIPS 140-2 or Common Criteria, however beyond this it is very likely there is no way to mitigate whatever issue your scanner is determining needs address. You can confirm with Cisco TAC, and then your organization can determine how to accept or mitigate this risk with some other control.

View solution in original post

Before Cisco publish a CSA for this there is likely no one, or at least not that many, in this forum that can answer your question. Your best option is to reach out to TAC and open a SR with them to go into details on this.



Response Signature


View solution in original post

7 Replies 7

It would be helpful if you where to link to the defect note.



Response Signature


Thanks Roger,

 

These are the defects below;

 

(1) To remove default virtual web-sites which reply to HTTP requests with arbitrary value of the HOST header.

 

(2) On IIS set a non-null 'Host header value' for all web sites.

 

(3) On Apache, set a non-null value of Server Name for all virtual sites (even if there is only one site, it should work as Virtual Host), and ensure that the site does not point to any other sites, but returns an error.

 

 Thanks.

Do you have a link for the CSA that Cisco has posted for this defect that you ask about?



Response Signature


Hi Roger,

 

Unfortunately, I do not have the CSA but from the scan tool used to scan for the vulnerabilities these are the detailed results for the vulnerability;

 

Anti DNS Pinning (DNS rebinding) attack allows an attacker to manipulate the correspondence between IP address and fully qualified domain name (FQDN) with the purpose of initialising active content within the trust relationship with the vulnerable site.

 

This technique allows an attacker to use the target browser for obtaining access to protected sites (for example, such sites that are protected by firewall or those that require authentication).

 

Unlike Cross-Site Request Forgery (CSRF), the purpose of Anti DNS Pinning attack is to obtain sensitive data (confidentiality violation), not to perform specific actions with an application (integrity violation). However, used in combination with CSRF, Anti DNS Pinning can allow gaining full access to a web application via user browser. The problem is that server does not sufficiently verify Host field in HTTP request. Server should return an error if the received request includes arbitrary address in Host field.

 

Thanks.

Before Cisco publish a CSA for this there is likely no one, or at least not that many, in this forum that can answer your question. Your best option is to reach out to TAC and open a SR with them to go into details on this.



Response Signature


Adam Pawlowski
VIP Alumni
VIP Alumni

In general the configuration of the HA Proxy or Tomcat is not accessible, it is configured within the appliance. Some of the controls that are available include setting minimum TLS, adjusting presented ciphers, and controlling session timeouts. Sometimes system behaviors are adjusted when operating in a compliance mode like FIPS 140-2 or Common Criteria, however beyond this it is very likely there is no way to mitigate whatever issue your scanner is determining needs address. You can confirm with Cisco TAC, and then your organization can determine how to accept or mitigate this risk with some other control.

J_Fub
Level 1
Level 1

Thanks Roger and Adam for your responses and advice, I will contact Cisco TAC.

 

Best Regards.