Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: IOS rootkits (fwd)
From: Gadi Evron <ge () linuxbox org>
Date: Sun, 25 May 2008 05:37:11 -0500 (CDT)

In this email to I summarise the discussion thread.

One thing we did not do in these threads is to thank Core Security and 
Sebastian Muniz for the work, and releasing it to help make the world 


Date: Sun, 25 May 2008 05:27:36 -0500 (CDT)
From: Gadi Evron
To: Joel Jaeggli
Subject: Re: IOS rootkits

On Sun, 18 May 2008, Joel Jaeggli wrote:
Dragos Ruiu wrote:

First of all about prevention, I'm not at all sure about this being
covered by existing router security planning / BCP.
I don't believe most operators reflash their routers periodically, nor
check existing images (particularly because the tools for this
integrity verification don't even exist). If I'm wrong about this I
would love to be corrected with pointers to the tools.

I have 6 years worth of rancid logs for every time the reported number
of blocks in use on my flash changes, I imagine others do as well.
That's hardly the silver bullet however.

Cisco considerably updated its rootkits page (which was 3 lines, yes, just 3 
lines, last week, you might think it was a previously unknown threat).

Last Updated 2008 May 22 1600 UTC (GMT)
For Public Release 2008 May 16 0400 UTC (GMT)
Some update!

The new page gives a lot of information on best practices, MD5 verifications, 
etc. Very good as a security best practices page but still not much of an "anti 
rootkit" page. Well worth taking a look:


Again, very good page even if it in no way addresses the threat.

Last week my opinions were well-formed after a few years of thinking on the 
subject. I decided to re-examine my take as I may have just stagnated on the 
issue and the landscape changed. I reached the same conclusions.

Still no decent response on why they never spoke to their clients on Trojan 
horses on IOS, rootkits on IOS.. or practically, what tools they provide to 
deal with them or what their plans are to help us protect ourselves and our 
infrastructure. One could guess they have non.

As someone recently mentioned to me, after the Michael Lynn talk they
started admitting to remote code execution vulnerabilities being more than
just DoS in their announcements. Maybe that is a trend and we will get more 
information from them in the future, now that rootkits as a threat to IOS is a 
publis issue.

Cisco's "threats don't exist until our clients already know of them" strategy 
is running out of steam, and will soon outlive its usefulness. Cisco is acting 
pretty much like Microsoft did 10 years ago, they shouldn't be surprised if 
security research treats them the same way as it treated Microsoft.

I know what their treatment made _me_ do psychologically, it made me not want 
to reach out to them. It seems like the Michael Lynn way is the only way to go 
with their current attitude--full disclosure.

As to the risk itself, it is my personal belief IOS rootkits are currently a 
threat as a targeted attack. Therefore, although of serious concern it is not 
yet something I fear on the Internet scale.

Pure FUD, Cisco provided us with no real data:
I do however dread the day XR gains some popularity, then it is as bad as 
Windows XP exploitability-wise. 2003, year of the worm. 2013, year of the Cisco 


Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]