Cisco Security Advisory: FWSM URL Filtering Solution TCP ACL Bypass Vulnerability
Cisco Security Advisory: FWSM URL Filtering Solution TCP ACL Bypass Vulnerability
Revision 1.0
For Public Release 2005 May 11 1600 UTC (GMT)
Summary
Affected Products
Details
Impact
Software Versions and Fixes
Workarounds
Obtaining Fixed Software
Exploitation and Public Announcements
Status of This Notice: FINAL
Distribution
Revision History
Cisco Security Procedures
Summary
The Cisco Firewall Services Module (FWSM) is a high−speed, integrated firewall module for Catalyst 6500
series switches and Cisco 7600 series routers. A vulnerability exists in the Cisco Firewall Services Module
when URL, FTP, or HTTPS filtering is enabled in which inbound TCP packets can bypass access−list entries
intended to explicitly filter them.
Cisco has made free software available to address this vulnerability. There are workarounds available to
mitigate the effects of the vulnerability.
Affected Products
This section provides details on affected products.
Vulnerable Products
Only Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Internet Routers with a Firewall Services
Module (FWSM) installed running version 2.3.1 or prior are affected when configured to allow exceptions for
content filtering.
An example configuration of a filter exception which allows internal hosts to reach another network might be
FWSM#show filter
filter https except 0.0.0.0 0.0.0.0 10.1.3.0 255.255.255.0
filter ftp except 0.0.0.0 0.0.0.0 10.1.3.0 255.255.255.0
filter url except 0.0.0.0 0.0.0.0 10.1.3.0 255.255.255.0
filter url http 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0
filter ftp 21 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0
filter https 443 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0
If the resulting output includes a filter command with an argument of except, you may be susceptible to the
vulnerability outlined in this advisory.
To determine if you are running a vulnerable version of FWSM software, issue the show module command in
IOS or CatOS to identify what modules and sub−modules are installed in the system.
The example below shows a system with a Firewall Service Module (WS−SVC−FWM−1) installed in slot 4.
6506−B#show module
Mod Ports Card Type Model Serial No.
−−− −−−−− −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− −−−−−−−−−−−−−−−−−− −−−−−−−−−−−
1 48 SFM−capable 48 port 10/100/1000mb RJ45 WS−X6548−GE−TX SAxxxxxxxxx
4 6 Firewall Module WS−SVC−FWM−1 SAxxxxxxxxx
5 2 Supervisor Engine 720 (Active) WS−SUP720−BASE SAxxxxxxxxx
6 2 Supervisor Engine 720 (Hot) WS−SUP720−BASE SAxxxxxxxxx
After locating the correct slot, issue the show module <slot number> command to identify the version of
software running:
6506−B#sho module 4
Mod Ports Card Type Model Serial No.
−−− −−−−− −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− −−−−−−−−−−−−−−−−−− −−−−−−−−−−−
4 6 Firewall Module WS−SVC−FWM−1 SAxxxxxxxxx
In this example, the FWSM is running version 2.3(1) as indicated by the column under "Sw" above.
Alternatively, the information may also be gained directly from the FWSM via the show version command:
FWSM#show version
For customers managing their FWSM via the PIX Device Manager (PDM), simply log into the application,
and the version may be found either in the table in the login window or in the upper left hand corner of the
PDM window indicated by a label similar to:
Although access lists (ACL) can be used to prevent outbound access to specific websites or File Transfer
Protocol (FTP) servers via IP address and/or IP address/port pairs, configuring and managing web usage this
way is often not practical because of the size and dynamic nature of the Internet. The FWSM may be used in
conjunction with a Websense Enterprise or N2H2 server to better manage filtering of Hypertext Transfer
Protocol (HTTP), HTTP over Secure Sockets Layer (HTTPS), and FTP connections to and from the Internet.
If URL, HTTPS, or FTP filtering exceptions has been configured via the command
in order to exclude certain addresses from being filtered, then a vulnerability exists where any TCP traffic that
matches this exception filter is also exempt from the inbound ACL inspection on any interface. Since filtering
is enabled for outbound connections from the inside interface, a configuration may be common where any
source address coming from an internal network is able to reach servers placed on a DMZ via a source address
and mask of all zeros in order to simplify configurations.
An example configuration of a filter exception which allows internal hosts to reach another network might be:
In this example, all TCP traffic from any interface destined to hosts on the 10.1.3.0/24 network will bypass all
FWSM interface input ACLs including those that explicitly deny them.
Impact
Successful exploitation of the vulnerability may result in TCP traffic which would normally not be allowed
past the FWSM on any interfaces to be able to reach hosts which should be protected by the FWSM.
Workarounds
The effectiveness of any workaround is dependent on specific customer situations such as product mix,
network topology, traffic behavior, and organizational mission. Due to the variety of affected products and
releases, customers should consult with their service provider or support organization to ensure any applied
workaround is the most appropriate for use in the intended network before it is deployed.
The workaround for this issue is to remove any filter exception rules which exist from the configuration. Filter
exception rules would start with
For more information on configuring the content filtering commands please consult:
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/mod_icn/fwsm/fwsm_2_3/fwsm_ref/df.htm#wp1142003
Customers may only install and expect support for the feature sets they have purchased. By installing,
downloading, accessing or otherwise using such software upgrades, customers agree to be bound by the terms
of Cisco's software license terms found at http://www.cisco.com/public/sw−license−agreement.html, or as
otherwise set forth at Cisco.com Downloads at http://www.cisco.com/public/sw−center/sw−usingswc.shtml.
Please have your product serial number available and give the URL of this notice as evidence of your
entitlement to a free upgrade. Free upgrades for non−contract customers must be requested through the TAC.
Customers may only install and expect support for the feature sets they have purchased. By installing,
downloading, accessing or otherwise using such software upgrades, customers agree to be bound by the terms
of Cisco's software license terms found at http://www.cisco.com/public/sw−license−agreement.html, or as
otherwise set forth at Cisco.com Downloads at http://www.cisco.com/public/sw−center/sw−usingswc.shtml.
A stand−alone copy or Paraphrase of the text of this document that omits the distribution URL in the
following section is an uncontrolled copy, and may lack important information or contain factual errors.
Distribution
This advisory will be posted on Cisco's worldwide website at
http://www.cisco.com/warp/public/707/cisco−sa−20050511−url.shtml.
In addition to worldwide web posting, a text version of this notice is clear−signed with the Cisco PSIRT PGP
key and is posted to the following e−mail and Usenet news recipients.
• cust−security−[email protected]
• first−[email protected] (includes CERT/CC)
• [email protected]
• [email protected]
• cisco−[email protected]
• full−[email protected]
• [email protected]
Future updates of this advisory, if any, will be placed on Cisco's worldwide website, but may or may not be
actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to
check the above URL for any updates.
Revision History
Revision 1.0
2005−May−11 Initial public release.
All contents are Copyright © 2006−2007 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.