[29782] in bugtraq

home help back first fref pref prev next nref lref last post

nb1300 router - default settings expose password

daemon@ATHENA.MIT.EDU (denote)
Tue Apr 15 12:14:55 2003

Date: 15 Apr 2003 00:34:13 -0000
Message-ID: <20030415003413.14841.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: denote <denote@freemail.com.au>
To: bugtraq@securityfocus.com



_____________________________________________
Buqtraq post

Vendor: Netcomm Australia

www.netcomm.com.au

Netcomm, Vulnerability in FTP server

NB 1300 modem/router

Affected firmware: all known versions

______________________________________________

Description and Background:

The NB1300 has by default the ftp server (VxWorks (5.4.1)) exposed to the 
WAN interface. 
The default password is often not changed by the User.
User: admin Password: password
When connection is made to the ftp server the routers core system 
Files are exposed to the admin account. 
Perform a simple "get config.reg" and the username and password 
Of the account are given in clear text.

_______________________________________________

Impact:

1.
The username and password may be used to access the users 
Account details, collect their email, use the data available to them 
Etc... 
2. (untested) The system files of the VxWorks (5.4.1) OS may be modified 
or deleted 
to impact a denial of service, rendering device useless.

_______________________________________________

Fix: disable the ftp WAN access and/or change
Admin account details.

_______________________________________________

Recommendations:
Vendor to supply product with interface disabled by default 
_______________________________________________
Vendor:

Has been notified 04/03/2003 
No response received
_______________________________________________

denote@freemail.com.au

home help back first fref pref prev next nref lref last post