[33878] in bugtraq

home help back first fref pref prev next nref lref last post

Re: SNMP community string disclosure in Linksys WAP55AG

daemon@ATHENA.MIT.EDU (Robbie Stone)
Fri Feb 20 15:33:17 2004

Date: Thu, 19 Feb 2004 22:06:19 -0000
To: "Hugo van der Kooij" <hvdkooij@vanderkooij.org>,
        <bugtraq@securityfocus.com>
From: "Robbie Stone" <robbie@serendipity.palo-alto.ca.us>
Message-ID: <twig.1077228379.32491@serendipity.palo-alto.ca.us>
In-Reply-To: <Pine.LNX.4.58.0402182212330.29822@gandalf.hugo.vanderkooij.org>

Simply requiring a valid read-only community string to obtain a read-write
string is not sufficient enough protection.

It is possible to expose a read-only community string through a packet
broadcast on an unpopulated arp table on a switch, thus expose the entire unit
to attack. The owner may not even wish to update any data via SNMP, but simply
walking the table with a read-only string will allow any attacker to do so.

Can anyone confirm if the strings are writable via the read-write community
string? If an attacker was able to change the configuration and then lock-out
the remote administration capabilities it would create quite a nuisance,
especially if the access point is in a remote location.

Robbie


> On Wed, 17 Feb 2004, NN Poster wrote:
> 
> > Linksys WAP55AG does not properly secure SNMP community strings. In
particular, it is possible to obtain all community strings, including
read/write, by querying OID 1.3.6.1.4.1.3955.2.1.13.1.2.
> >
> > 1.3.6.1.4.1.3955.2.1.13.1.2.1 = STRING: "public"
> > 1.3.6.1.4.1.3955.2.1.13.1.2.2 = STRING: "private"
> >
> > Verified on WAP55AG, firmware 1.07
> 
> But ... Can you obtain this information without a valid community string?
> 
> Hugo.
> 
> -- 
>  All email sent to me is bound to the rules described on my homepage.
>     hvdkooij@vanderkooij.org		http://hvdkooij.xs4all.nl/
> 	    Don't meddle in the affairs of sysadmins,
> 	    for they are subtle and quick to anger.
> 



-- 




home help back first fref pref prev next nref lref last post