[9887] in bugtraq

home help back first fref pref prev next nref lref last post

Default password in Bay Networks switches.

daemon@ATHENA.MIT.EDU (Jan B. Koum)
Wed Mar 10 18:13:12 1999

Date: 	Wed, 10 Mar 1999 14:48:58 -0800
Reply-To: "Jan B. Koum" <jkb@BEST.COM>
From: "Jan B. Koum" <jkb@BEST.COM>
To: BUGTRAQ@NETSPACE.ORG

	Ok.. so you would think after 3Com $%#& up last year of inserting
	default password into firmware vendors would learn their lesson?
	[See http://geek-girl.com/bugtraq/1998_2/0340.html for 3com rant]

	Hah! Welcome to the world of strings and Bay Networks firmware
	files. I have looked at some bay networks switches and see that
	the following have default password of "NetICs"

BayStack 350T   HW:RevC  FW:V1.01 SW:V1.2.0.10
BayStack 350T   HW:RevC  FW:V1.01 SW:V2.0.0.15

	These however I was not able to find defaults for:

BayStack 350-24T HW:RevA  FW:V1.04 SW:V1.0.0.2
Bay Networks BayStack 303 Ethernet Switch
BayStack 28115/ADV Fast Ethernet Switch

	If you have firmware images for the above, just

% strings *.img | grep -B5 "Invalid Password"

	Something similar to this command might give you the passwd.
	Of course I don't have to tell you about how bad it is when
	someone can control your network infrastructure (switches).

	I don't have much experience with Bay hardware (in fact, I have
	none - someone at work just asked me to help them get into a
	switch for which they forgot the password). If someone can
	shed some light on this topic, it would be great.

	And yes, I consider this to be a backdoor - wouldn't you call it
	a backdoor if Solaris had default password for root logins?
	How can vendors in 1999 even THINK about something as stupid as
	inserting a default password like this into a switch!?!?
	Granted - I am almost sure Bay didn't have evil intentions for
	the use .. but still. I am speechless.

-- Yan


P.S. - Greetz to the inhabitants of #!adm and #!w00w00

home help back first fref pref prev next nref lref last post