[29743] in bugtraq

home help back first fref pref prev next nref lref last post

Medium Vulnerability in SNMP on Linsys BEFVP41

daemon@ATHENA.MIT.EDU (Branson Matheson)
Sat Apr 12 04:08:57 2003

Date: 9 Apr 2003 18:48:53 -0000
Message-ID: <20030409184853.18270.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Branson Matheson <branson@windborne.net>
To: bugtraq@securityfocus.com



While the following is not a critical vulnerability, it is a serious 
problem for those that are implementing these VPN routers in production 
environments. 




Problem:




  The MIB information available from the default 'public' community name on 
the external interface of a Linksys VPN router includes information about 
the hosts on the inside of the protected network including routes, hardware 
addresses ( MAC ), and some configuration information. What is NOT 
available include information about the VPN's configured, any preshared 
keys, VPN routes, or endpoint IP's. 




Testability:


  


 install the net-snmp package and run the following on any Linksys router


that has not had it's community names altered:




  snmpwalk -v 1 -c public {ip} 




This has been tested on versions 1.40.3f and 1.40.4 ( latest ) version.




Solution: 


  


 Change the community names configured in the 'password' section of the 


VPN routers web based config tool. There is no current way to disable SNMP. 




Vendor:




 I have sent numerous mails to the vendor concerning this issue starting 
about 90 days ago. The last several have been ignored. 

home help back first fref pref prev next nref lref last post