IOS Theft and Telephony: Something New to Worry AboutBy Ellen Muraskin | Posted 2004-05-20 Email Print
Re-Thinking HR: What Every CIO Needs to Know About Tomorrow's Workforce
Should VOIP resellers be worried about the IOS theft? According to Christopher King, information security practice director at Principal Security Group, "Hell, yes."I assured readers with my first column that my job here is to report on VOIP, not to praise it. Which is why I'm just as eager as anyone to get a read on the potential seriousness of the Cisco IOS source code theft and its implications for the reliability of IP-based communications.
As reported by a Russian security Web site and confirmed by Cisco, hackers broke into the switching and routing giant's network and stole 800MB of source code for IOS 12.3 and 12.3t. The IOS 12.3 operating system powers Cisco's networking product suite, including routers used in homes and small businesses and the 7000 series that makes up the Internet backbone. All of Cisco's infrastructure productsswitches and routersare exposed.
I wrote five days ago that an IP voice application inherits the security of the data network. If someone can hack into your network infrastructure (typically composed of a Cisco router and switches) and bring it down, obviously, that's not a good inheritance. If your voice traffic is using voice over IP, it relies on the network infrastructure being robust. Whether it's Cisco's Call Manager or anyone else's IP PBX you're using, a router ם and very likely that's a Cisco router fronts the system.
Three days after the announcement of the theft, Cisco itself has no immediate assurance to offer the press. They officially reply:
- "Cisco is aware that a potential compromise of its proprietary information occurred and was reported on a public website just prior to the weekend. Cisco is fully investigating what happened. As a matter of policy, we take security very seriously and we continue to take every measure to protect our intellectual property, employee and customer information. Cisco will remain focused on its customers' success and will continue to monitor the situation."
I've also contacted major Cisco VOIP systems integrators, none of whom is willing to comment on the potential breach. I finally turned to Christopher King, CCISP, of Principal Security Group and former information security practice director at Greenwich Technology Partners, a major Cisco VAR with an active VOIP practice. I asked him if telecom or IT managers have something new to worry about here. His reply: "Hell, yes."
He described the situation as a waiting game, while hackers study the IOS source for vulnerabilities, manually code attacks to bring down routers and then automate the exploit (the attack) so that it proliferates throughout the Internet.For the complete story, click here.