RE: Cisco Clean Access Agent (Perfigo) bypass
From: Dario Ciccarone (dciccaro) (dciccaro_at_cisco.com)
Date: Sun, 21 Aug 2005 09:57:14 -0400 To: <firstname.lastname@example.org>, <email@example.com>
-----BEGIN PGP SIGNED MESSAGE-----
This post is to confirm that the Cisco Systems PSIRT is actively
researching into this issue. We will be providing a more thorough answer
on Monday, August 22, 2005.
Attached: a cleartext, PGP signed version of this same email.
Quidquid latine dictum sit, altum viditur
Product Security Incident Response Team (PSIRT)
Cisco Systems, Inc.
> -----Original Message-----
> From: firstname.lastname@example.org [mailto:email@example.com]
> Sent: Friday, August 19, 2005 12:30 PM
> To: firstname.lastname@example.org
> Subject: Cisco Clean Access Agent (Perfigo) bypass
> Cisco Clean Access is an easily deployed software solution
> that can automatically detect, isolate, and clean infected or
> vulnerable devices that attempt to access your network. It
> identifies whether networked devices such as laptops,
> personal digital assistants, even game consoles are compliant
> with your network's security policies and repairs any
> vulnerabilities before permitting access to the network.
> Vendor site:
> Affected versions:
> This works in at least 22.214.171.124 and 3.5.4.
> Discovery Date:
> Report Date:
> End users can bypass the "mandatory" installation of the
> Clean Access Agent by changing the User-Agent string of their
> browser. This allows them to connect to the network without
> the host-based checks being run. If configured, remote checks
> are still run.
-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1
-----END PGP SIGNATURE-----
- application/octet-stream attachment: cisco-bugtraq-cca.txt.asc