Re: Cisco VPN Client can be used to gain local administrator rights (All Versions, patched or otherwise)
From: Sharad Ahlawat (sahlawat_at_CISCO.COM)
Date: Thu, 22 May 2003 19:30:37 -0700 To: NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
-----BEGIN PGP SIGNED MESSAGE-----
This is in response to the mail sent by Nick Staff. The original mail is
Physical access to the workstation and a valid user account are required to
exploit this vulnerability which results in a person gaining local system
administrative privileges. This vulnerability does not compromise the
confidentiality of the data traversing the VPN tunnel established by the
Cisco VPN Client.
Upon initial confirmation of the vulnerability, Cisco bug CSCeb12179 was
opened to address the issue. Cisco continues to work on its resolution with
due urgency and will announce an updated version to its customers as soon as
one is tested and available.
The current workaround/mitigation technique is to make all the Cisco VPN
client executable files read only for non administrative user groups.
Cisco confirmed the report of this new vulnerability on May 15, 2003 and had
requested joint disclosure with the reporter once a fix was tested and
available for our customers.
Cisco will continue to follow the guidelines of responsible disclosure with
any reported vulnerabilities in its products. We welcome your reports and
comments at email@example.com. For further information, please visit our web
site at http://www.cisco.com/go/psirt .
On Thursday 22 May 2003 11:54, Nick Staff wrote:
NS>First, before getting into this exploit I think it's only fair to say
NS>that my last post, "Cisco Systems VPN Client allows local logon with
NS>Elevated Privileges" was as Cisco's representative Sharad Ahlawat said,
NS>outdated and already addressed (see following link):
NS>That said, I was sufficiently enough embarrassed to see if I could get
NS>around their patched client, and here's how to do it:
NS>- Log on as a standard user.
NS>- Browse to the C:\winnt directory, right click on explorer.exe and
NS>- Browse to C:\Program Files\Cisco Systems\VPN Client (the directory
NS>with ipsecdialer.exe) and paste a copy of explorer.exe into the folder.
NS>- Double click on ipsecdialer.exe and select options > Windows logon
NS>- Click on the first box to "enable start before log on".
NS>- Click OK and Close.
NS>- Rename ipsecdialer.exe to ipsecdialer.ex_
NS>- Rename the copy of explorer.exe to ipsecdialer.exe
NS>- Close any open windows.
NS>- log out.
NS>- log back on as the same standard user.
NS>- Click okay on any error messages that appear.
NS>- DO NOT CLOSE THE EXPLORER WINDOW THAT IS OPEN.
NS>- At this point you may see your desktop or you may not (have had it
NS>happen both ways), but whatever the case, that Explorer window is open
NS>as local system and anything else you see is opened as the standard
NS>- In the open explorer window press the Up folder icon until you get to
NS>- Double click on Control Panel, then Administrative Tools, then
NS>- Expand Local Users and Groups and add your Standard User account to
NS>the Local Administrators Group.
NS>The following steps are provided to return your machine to it's previous
NS>state (i.e. logging in without the client launching explorer)
NS>- Navigate to C:\Program Files\Cisco Systems\VPN Client and open the
NS>- set runatlogon=0
NS>- Save the file and restart the machine (Ctrl-Alt-Del if no Start
NS>And to Verify the Changes took...
NS>Log on as the Standard user and do whatever you want.
NS>Cisco has been notified about this issue and has acknowledged it, but
NS>since asking for a week to test it further I have not heard from them
NS>I can't code, but it would seem the file at fault is csgina.dll which is
NS>Cisco's replacement Gina that's installed automatically (and I assume is
NS>what allows the explorer window to be launched in the system process).
NS>Also, this exploit would be harder if not impossible were Cisco to
NS>secure their install folder, but unfortunately even if I have
NS>permissions set on the Program Files folder to only allow Users Read
NS>access the Cisco install creates a subfolder which grants the
NS>Interactive user Modify permissions. I think they do this because the
NS>program constantly re-encrypts the group authentication key which is
NS>stored in a text file in that directory.
NS>This has been Verified on Windows 2000 with SP3 and Windows 2003 Server
NS>with the newest version of the Cisco VPN client (as well as older
Cisco Product Security Incident Response Team (PSIRT)
Phone:+1 (408) 527-6087
-----BEGIN PGP SIGNATURE-----
Comment: PGP Signed by Sharad Ahlawat
-----END PGP SIGNATURE-----
Delivery co-sponsored by TruSecure
FREE 14-DAY TRIAL of New Threat & Vulnerability Notification Service
TruSecure's new IntelliShield(tm) web-based threat and vulnerability
service isn't your typical alert service. Supported by TruSecure's vast
intelligence resources - including the ICSA Labs - IntelliShield's early
warning, analysis, decision support, and threat management tools provide
organizations with unmatched intelligence to better protect critical
information assets. Experience it for yourself - just click below to begin
your FREE, NO OBLIGATION 14-day trial today!