They're definitely covering the bases on this one. There are a total of 6 Cisco Bug IDs directly related to this. Looks like one for each file on each product that would have contained the plaintext random key. I guess it was only a matter of time. As much as I hate to see this particular door closed, I understand and agree with the logic behind it.
http://www.securityfocus.com/bid/83103/discuss To those in the DRS group, I apologize for any headache this has caused. But please do not put any additional restrictions in place to unlocking backup data. As customers, we have a legitimate need to access data from backups without having to perform a full restore. Some customers do not have the resources necessary to stand up sandbox environments for restores. Even if they do, an engineer should not have to spend an entire day restoring a system in order to fulfill a voicemail extraction request from legal. That's the reason this program was written to begin with. DRS Message Fisher wasn't updated with an option to open encrypted backup sets by inputting the cluster security password. Thanks, Pete <http://www.securityfocus.com/bid/83103/discuss> Multiple Cisco Unified Products CVE-2016-1319 Information Disclosure Vulnerability<http://www.securityfocus.com/bid/83103/discuss> www.securityfocus.com SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet's largest and most comprehensive database of computer security knowledge and resources to the public. It also hosts the BUGTRAQ mailing list. ________________________________ From: Pete Brown <j...@chykn.com> Sent: Friday, April 15, 2016 3:42 PM To: cisco-voip@puck.nether.net Subject: DRS Backup Decrypter - Decrypt Failure After Patching Looks like the party is going to be over for decrypting backup sets without requiring the cluster security password... https://quickview.cloudapps.cisco.com/quickview/bug/CSCuv8592<https://quickview.cloudapps.cisco.com/quickview/bug/CSCuv85926> All encrypted DRS backup sets until now have contained a plaintext copy of the randomly generated backup key. It lists the known affected releases as 10.5(2.12901.1), but this goes all the way from 8.0 to 11.5 and affects CUCM, UCON and UCCX. This is how the decrypter has been able to decrypt backup sets without the cluster security password. Once this is patched, you may no longer be able to decrypt backups even if you type in the correct password. If you run into this, please let me know and I'll work on an update. Thanks, Pete
_______________________________________________ cisco-voip mailing list cisco-voip@puck.nether.net https://puck.nether.net/mailman/listinfo/cisco-voip