nb1300 router - default settings expose password

From: denote (denoteat_private)
Date: Mon Apr 14 2003 - 17:34:13 PDT

  • Next message: Martin Schulze: "[SECURITY] [DSA 287-1] New EPIC packages fix DoS and arbitrary code execution"

    
     ('binary' encoding is not supported, stored as-is)
    _____________________________________________
    Buqtraq post
    
    Vendor: Netcomm Australia
    
    www.netcomm.com.au
    
    Netcomm, Vulnerability in FTP server
    
    NB 1300 modem/router
    
    Affected firmware: all known versions
    
    ______________________________________________
    
    Description and Background:
    
    The NB1300 has by default the ftp server (VxWorks (5.4.1)) exposed to the 
    WAN interface. 
    The default password is often not changed by the User.
    User: admin Password: password
    When connection is made to the ftp server the routers core system 
    Files are exposed to the admin account. 
    Perform a simple "get config.reg" and the username and password 
    Of the account are given in clear text.
    
    _______________________________________________
    
    Impact:
    
    1.
    The username and password may be used to access the users 
    Account details, collect their email, use the data available to them 
    Etc... 
    2. (untested) The system files of the VxWorks (5.4.1) OS may be modified 
    or deleted 
    to impact a denial of service, rendering device useless.
    
    _______________________________________________
    
    Fix: disable the ftp WAN access and/or change
    Admin account details.
    
    _______________________________________________
    
    Recommendations:
    Vendor to supply product with interface disabled by default 
    _______________________________________________
    Vendor:
    
    Has been notified 04/03/2003 
    No response received
    _______________________________________________
    
    denoteat_private
    



    This archive was generated by hypermail 2b30 : Tue Apr 15 2003 - 09:00:21 PDT