The network appliances manufacturer giant Cisco published an advisory on 19 April 2022 in which Cisco detailed an authentication bypass vulnerability in Cisco Modeling Labs, a network simulation and visualization tool developed by Cisco Systems. The vulnerability tracked as CVE-2023-20154 is a Critical severity vulnerability with a CVSS score of 9.1 out of 10. The flaw is in the external authentication mechanism of Cisco Modeling Labs that allows an unauthenticated, but unprivileged, remote attacker to bypass authentication and log in to the web management interface of an affected device with administrative privileges. Since this flaw allows the attacker to access the web interface with administrative privileges, it is most important to fix the CVE-2023-20154 vulnerability. Let’s see how to fix CVE-2023-20154, an authentication bypass vulnerability in Cisco Modeling Labs.
Cisco Modeling Labs (CML) is a network simulation and visualization tool developed by Cisco Systems. It allows network engineers and administrators to create virtual network environments to test and validate complex network scenarios, configurations, and designs.
CML is designed to simulate multiple network devices, such as routers, switches, firewalls, and servers, allowing users to configure and test their behavior in a virtual environment before implementing changes in the live network. The software supports a range of network protocols and technologies, including IPv4, IPv6, BGP, OSPF, MPLS, VPN, and many others.
CML provides an intuitive graphical user interface that enables users to create and manage virtual network topologies with ease. It also includes a comprehensive set of tools and features for network modeling, testing, and troubleshooting, such as packet capturing, protocol analysis, and network performance monitoring.
This is an critical authentication bypass vulnerability in Cisco Modeling Labs. The vulnerability is due to the improper handling of specific messages returned by the associated external authentication server. This vulnerability could be exploited by logging in to the web interface of an affected server. The flaw allows an authenticated, remote attacker not only to bypass authentication but also to access and modify every simulation.
Associated CVE ID | CVE-2023-20154 |
Description | A Critical Severity Authentication Bypass Vulnerability in Cisco Modeling Labs |
Associated ZDI ID | – |
CVSS Score | 9.1 critical |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
Impact Score | – |
Exploitability Score | – |
Attack Vector (AV) | None |
Attack Complexity (AC) | Low |
Privilege Required (PR) | None |
User Interaction (UI) | None |
Scope | Unchanged |
Confidentiality (C) | High |
Integrity (I) | High |
availability (a) | None |
The vulnerability affects the following Cisco products configured with LDAP authentication:
Modeling Labs for Education
Modeling Labs Enterprise
Modeling Labs – Not For Resale
To check if LDAP authentication is configured on your Cisco Modeling Labs, log in and navigate to Tools > System Administration > User Authentication. For more information, refer to the Configuring LDAP Authentication guide.
Cisco has confirmed that Modeling Labs – Personal and Modeling Labs – Personal Plus are not affected by this vulnerability.
Cisco has released software updates addressing this vulnerability, and workarounds are available. The table below shows Cisco Modeling Labs software releases and whether they are affected by this vulnerability, as well as the first release containing the fix for this vulnerability. Customers are advised to upgrade to a fixed software release as indicated:
Cisco Modeling Labs Release | First Fixed Release |
---|---|
2.2 and earlier | Not vulnerable |
2.3 | Migrate to a fixed release |
2.4 | Migrate to a fixed release |
2.5 | 2.5.1 |
We recommend to upgrade to v2.5.1 to fix the CVE-2023-20154 vulnerability.
Before we discuss about the available workaround, let’s see the specific condition required to exploit the CVE-2023-20154 vulnerability.
The vulnerability can only be exploited under specific conditions determined by the associated LDAP authentication server’s response to authentication queries from Cisco Modeling Labs. If the LDAP server is configured to reply to search queries with a non-empty array of matching entries (containing search result reference entries), the authentication bypass vulnerability can be exploited. Only the LDAP server administrator can verify and change this behavior, as it cannot be influenced by an attacker.
Administrators can address this vulnerability by verifying the LDAP authentication server configuration, making sure that failing search queries do not return non-empty matching result arrays. Methods for achieving this depend on the deployed LDAP server. For further guidance, consult the documentation for your specific LDAP installation.
Upgrading your existing Cisco Modeling Labs (CML) installation to the latest release is crucial to take advantage of new features and improvements. In this guide, we’ll walk you through the process of upgrading your CML installation seamlessly. Please note that to upgrade to the latest CML release, your existing instance must be CML 2.3.0 or higher. Please refer to official installation or upgradation guide for more details.
Check Release Notes: Always review the Release Notes for Cisco Modeling Labs to ensure an in-place upgrade is supported from your current release.
Backup Modifications: If you’ve made custom changes to your system (copying images, altering configuration files, etc.), back up those changes before starting the upgrade.
Download Upgrade Files: Download the pkg.zip file or the .deb file for the CML controller to your local machine. Refer to the “Downloading Files for CML Installation” section for more details on acquiring these files.
Follow these steps to perform an in-place upgrade of your CML installation:
Step 1: Extract the Files (if applicable)
If you have a .zip file, use appropriate tools (7-Zip or WinZip for Windows, Archive Utility app or unzip CLI command for macOS) to extract its contents.
Step 2: Verify the File Signature (Optional)
If you downloaded the pkg.zip file, follow the instructions in the pkg.README file to verify the .pkg file’s signature.
Log into the CML server UI.
Navigate to Tools ‣ System Upgrade on the Lab Manager page.
Click the Browse button, select the upgrade package (cml2_2.3.1_build29_amd64.pkg or cml2_2.3.1_build29_amd64.deb), and click Upload Image.
Click the “using Cockpit” link to open the System Administration Cockpit.
Log into the System Administration Cockpit with the system administrator account.
Click CML2 in the navigation bar, and expand the Controller Software Upgrade item in the Maintenance section.
Click the Upgrade Controller button and wait for the process to complete. Check the Upgrade Log Output for confirmation.
If the System Administration Cockpit disconnects during the upgrade, click Reconnect and check the log output.
Once the upgrade is complete, ensure no error or failure messages are generated in the Output area.
Apply base OS software updates in the System Administration Cockpit (recommended).
Important: After completing the upgrade, advise all CML server users to clear their web browser caches before accessing the CML server again to prevent errors or other issues.
Log into the System Administration Cockpit with the system administrator account.
Click Services in the navigation bar, and then click the Targets tab.
Scroll down to virl2.target, and click on it.
Stop the services for this target by clicking the services menu and selecting Stop.
Click Software Updates in the navigation bar.
Click Install All Updates and wait for the process to complete.
If a reboot is recommended, click Restart Now. Otherwise, restart the virl2.target.
Navigate to Services ‣ Targets ‣ virl2.target in the System Administration Cockpit.
Click on the services menu and select Start to restart the services for this target.
Once the services are running, the Status will change to Active or Running.
We hope this post would help you know how to fix CVE-2023-20154, an authentication bypass vulnerability in Cisco Modeling Labs. Please share this post if you find this interested. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium & Instagram, and subscribe to receive updates like this.
You may also like these articles:
How to Fix CVE-2023-20238- An Authentication Bypass Vulnerability in Cisco BroadWorks?
How To Fix CVE-2022-20695- A Critical Authentication Bypass Vulnerability In Cisco WLC
How To Fix CVE-2022-20798- An Authentication Bypass Vulnerability In Cisco ESA And Cisco SMA
How To Fix The SSH Key Vulnerability In Cisco Umbrella Virtual Appliance- CVE-2022-20773?
What Is Authentication Bypass Vulnerability? How To Prevent It?
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.