Talos flags a security issue on Cisco's Smart Install clients
Cisco Talos warned its users about attackers who use publicly available tool to have unauthenticated access to customer configuration details in Cisco' s Smart Install. The team at Talos fears that the attackers use an app which goes by the name Smart Install Exploitation Tool, a tool available on Github, for scanning the clients.
Also, Talos believes that the attackers may possess good knowledge of Smart Install Protocol which helps them to fish out customer configurations from affected devices.
Cisco Smart Install is a component of the Cisco Smart Operations solution that helps manage LAN switches.
“ The attack leverages a known issue with the Smart Install protocol. Cisco PSIRT has published a security response to this activity. Abuse of the Smart Install protocol can lead to modification of the TFTP server setting, exfiltration of configuration files via TFTP, replacement of IOS image and potentially execution of IOS commands,” Talos reported.
Although, cisco does not consider the issue as an actual vulnerability, it is seen as a misuse of the Smart Install protocol, which does not require authentication by design and the company has updated the Smart Install Configuration Guide to include best security practices.
Only Smart Install client switches are affected by the vulnerability that is described in this advisory. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability.
Cisco Smart Install is a component of the Cisco Smart Operations solution that helps manage LAN switches.
A Smart Install network consists of one Smart Install Director switch or router, also known as the Integrated Branch Director (IBD), and one or more Smart Install Client switches, also known as Integrated Branch Clients (IBCs).
Metasploit users can identify Smart Install endpoints with the auxiliary/scanner/misc/cisco_smart_install module.