Threat Research

Cisco Self-Signed Certificate Expiration on Jan. 1, 2020: What You Need to Know

|Last updated on Dec 21, 2019|1 min read
LinkedInFacebookX
Cisco Self-Signed Certificate Expiration on Jan. 1, 2020: What You Need to Know

What’s up?

Cisco released Field Notice 70489 this week making owners of a wide range of Cisco devices of an impending certificate expiration issue that will both cause all generated self-signed certificates to expire on 2020-01-01 00:00:00 UTC and create a situation where new self-signed certificates cannot be created on affected devices after 2020-01-01 00:00:00 UTC.

This issue affects only self-signed certificates that were generated by the Cisco IOS or Cisco IOS XE device and applied to a service on the device. Certificates that were generated by a Certificate Authority (CA), which includes those certificates generated by the Cisco IOS CA feature, are not impacted by this issue.

The following features may be relying on the IOS-generated self-signed certificates, so you will want to check these before the New Year (UTC time).

General features

  • HTTP Server over TLS (HTTPS): HTTPS will produce an error in the browser that indicates that the certificate is expired.
  • SSH Server: Users who use X.509 certificates to authenticate the SSH session might fail to authenticate. (This use of X.509 certificates is rare. Username/password authentication and public/private key authentication are not affected.)
  • RESTCONF: RESTCONF connections might fail.

Collaboration features:

  • Session Initiation Protocol (SIP) over TLS
  • Cisco Unified Communications Manager Express (CME) with encrypted signaling enabled
  • Cisco Unified Survivable Remote Site Telephony (SRST) with encrypted signaling enabled
  • Cisco IOS dspfarm resources (Conference, Media Termination Point, or Transcoding) with encrypted signaling enabled
  • Skinny Client Control Protocol (SCCP) Telephony Control Application (STCAPP) ports configured with encrypted signaling
  • Media Gateway Control Protocol (MGCP) and H.323 call signaling over IP security (IPSec) without a pre-shared key
  • Cisco Unified Communications Gateway Services API in Secure Mode (using HTTPS)

Wireless features:

  • LWAPP/CAPWAP connections between older Cisco IOS access points (manufactured in 2005 or earlier) and Wireless LAN Controllers; see Cisco Field Notice FN63942 for more details.

If those certificates expire without a new certificate in place, you could end up with situations such as:

  • SIP over TLS calls will not complete.
  • Devices registered to Cisco Unified CME with encrypted signaling enabled will no longer function.
  • Cisco Unified SRST with encrypted signaling enabled will not allow devices to register.
  • Cisco IOS dspfarm resources (Conference, Media Termination Point, or Transcoding) with encrypted signaling enabled will no longer register.
  • STCAPP ports configured with encrypted signaling will no longer register.
  • Calls through a gateway using MGCP or H.323 call signaling over IPSec without a pre-shared key will fail.
  • API calls that use the Cisco Unified Communications Gateway Services API in Secure Mode (using HTTPS) will fail.
  • RESTCONF might fail.
  • HTTPS sessions to manage the device will display a browser warning that indicates the certificate has expired.
  • AnyConnect SSL VPN sessions will fail to establish or report an invalid certificate.
  • IPSec connections will fail to establish.

The “Lab’s Eye” view

Rapid7 Labs looked at certificates from recent Sonar scan data and found over 80,000 Cisco devices that will likely be impacted by this impending expiration issue.

image--2-.png

Top 20 Countries With Likely Impacted Cisco Devices

Countrynpct
United States1468921.61%
India49997.35%
South Korea27063.98%
Russia22493.31%
Mexico21743.20%
Taiwan20783.06%
Japan20693.04%
United Kingdom20242.98%
Brazil19482.87%
Canada16772.47%
Australia13742.02%
Singapore13642.01%
China12391.82%
Saudi Arabia10901.60%
Nigeria10201.50%
France9761.44%
Italy8491.25%
Germany7661.13%
Thailand7511.10%
Zambia6961.02%

Top 20 Networks With Likely Impacted Cisco Devices

AS Orgnpct
Reliance Jio Infocomm Limited26643.92%
Comcast Cable Communications, LLC19232.83%
AT&T Services, Inc.10711.58%
Utah Education Network10281.51%
Charter Communications Inc10181.50%
Korea Telecom8901.31%
Alestra, S. de R.L. de C.V.8121.19%
Liquid Telecommunications Ltd7931.17%
SingNet7881.16%
Cox Communications Inc.7821.15%
National Chiao Tung University7281.07%
Level 3 Parent, LLC7121.05%
ALGAR TELECOM S/A7021.03%
Cable & Wireless Panama6260.92%
MCI Communications Services, Inc. d/b/a Verizon Business5850.86%
Taiwan Academic Network (TANet) Information Center5560.82%
BTC-GATE15440.80%
NTT Communications Corporation5110.75%
Uninet S.A. de C.V.5070.75%
TE-AS4920.72%

These external exposure numbers are just the tip of the iceberg, as most organizations wisely do not expose remote interfaces on Cisco routers and switches, but do have to expose Cisco devices that are designed for, say, telephony operations. The internal exposure to this issue will likely be orders of magnitude larger.

What can you do?

Rapid7 customers can use InsightVM to report on expiring certificates in general and filter on Cisco devices in particular to identify impacted systems to facilitate faster remediation. Not a customer? You can get a free 30-day trial of InsightVM today to see if your Cisco devices are impacted.

Anyone can also use the openssl client found bundled with many operating systems and perform the following for each target IP address/hostname:

openssl s_client \
-showcerts \
-connect DEVICE_IP_ADDRESS:SERVICE_PORT 2>/dev/null | \
openssl x509 -noout -dates | \
grep notAfter

If you see the following response, your device is very likely impacted by this issue:

notAfter=Jan  1 00:00:00 2020 GMT

Rapid7 Labs feels compelled to re-emphasize the fact that failure to remediate this issue prior to the expiration date will create a situation where new self-signed certificates cannot be created on affected devices after 2020-01-01 00:00:00 UTC. The last thing most of us want is to ring in the new year with an emergency support call/page, so take some time before the new year to make sure none of your devices are going to be impacted by this issue.


Start a free 30-day trial of InsightVM to see if your Cisco devices are impacted

Get Started

Related blog posts