{"id":217185,"date":"2019-04-18T11:26:49","date_gmt":"2019-04-18T09:26:49","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=217185"},"modified":"2019-04-26T21:43:43","modified_gmt":"2019-04-26T19:43:43","slug":"asr-9000-router-cisco-patcht-remote-access-schwachstelle","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2019\/04\/18\/asr-9000-router-cisco-patcht-remote-access-schwachstelle\/","title":{"rendered":"ASR 9000-Router: Cisco patcht Remote Access-Schwachstelle"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>Cisco hat einen Sicherheitspatch f\u00fcr seine ASR 9000-Router ver\u00f6ffentlicht. Dieser Patch solle einen Bug beseitigen, der einen unauthorisierten Remote-Zugriff erm\u00f6glichte.<\/p>\n<p><!--more--><\/p>\n<p>In <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190417-asr9k-exr\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Sicherheitsmeldung<\/a> (Cisco IOS XR 64-Bit Software for Cisco ASR 9000 Series Aggregation Services Routers Network Isolation Vulnerability) beschreibt Cisco n\u00e4heres.<\/p>\n<blockquote><p>A vulnerability in the sysadmin virtual machine (VM) on Cisco ASR 9000 Series Aggregation Services Routers running Cisco IOS XR 64-bit Software could allow an unauthenticated, remote attacker to access internal applications running on the sysadmin VM.<\/p>\n<p>The vulnerability is due to incorrect isolation of the secondary management interface from internal sysadmin applications. An attacker could exploit this vulnerability by connecting to one of the listening internal applications. A successful exploit could result in unstable conditions, including both a denial of service and remote unauthenticated access to the device.<\/p><\/blockquote>\n<p>Eine Schwachstelle in der Sysadmin Virtual Machine (VM) auf Routern der Cisco ASR 9000 Series Aggregation Services, auf denen die Cisco IOS XR 64-Bit-Software ausgef\u00fchrt wird, k\u00f6nnte einem nicht authentifizierten, entfernten Angreifer den Zugriff auf interne Anwendungen erm\u00f6glichen, die auf der Sysadmin VM ausgef\u00fchrt werden. Die Schwachstelle ist auf eine falsche Isolierung der sekund\u00e4ren Managementschnittstelle von internen Sysadmin-Anwendungen zur\u00fcckzuf\u00fchren.<\/p>\n<p>Cisco hat Software-Updates ver\u00f6ffentlicht, die diese Schwachstelle beheben. Es gibt zudem Workarounds, die diese Schwachstelle beheben. Dieser Hinweis sind in <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190417-asr9k-exr\" target=\"_blank\" rel=\"noopener noreferrer\">diesem Dokument<\/a> verf\u00fcgbar. Weitere Details lassen sich in <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190417-asr9k-exr\" target=\"_blank\" rel=\"noopener noreferrer\">der Sicherheitsmeldung<\/a> sowie bei <a href=\"https:\/\/www.theregister.co.uk\/2019\/04\/18\/cisco_critical_patch\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Register<\/a> nachlesen. Wer solche Router im Unternehmen einsetzt, sollte sich also um Patches k\u00fcmmern.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco hat einen Sicherheitspatch f\u00fcr seine ASR 9000-Router ver\u00f6ffentlicht. Dieser Patch solle einen Bug beseitigen, der einen unauthorisierten Remote-Zugriff erm\u00f6glichte.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[731,426],"tags":[2038,4328],"class_list":["post-217185","post","type-post","status-publish","format-standard","hentry","category-gerate","category-sicherheit","tag-router","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/217185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=217185"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/217185\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=217185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=217185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=217185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}