[33878] in bugtraq
Re: SNMP community string disclosure in Linksys WAP55AG
daemon@ATHENA.MIT.EDU (Robbie Stone)
Fri Feb 20 15:33:17 2004
Date: Thu, 19 Feb 2004 22:06:19 -0000
To: "Hugo van der Kooij" <hvdkooij@vanderkooij.org>,
<bugtraq@securityfocus.com>
From: "Robbie Stone" <robbie@serendipity.palo-alto.ca.us>
Message-ID: <twig.1077228379.32491@serendipity.palo-alto.ca.us>
In-Reply-To: <Pine.LNX.4.58.0402182212330.29822@gandalf.hugo.vanderkooij.org>
Simply requiring a valid read-only community string to obtain a read-write
string is not sufficient enough protection.
It is possible to expose a read-only community string through a packet
broadcast on an unpopulated arp table on a switch, thus expose the entire unit
to attack. The owner may not even wish to update any data via SNMP, but simply
walking the table with a read-only string will allow any attacker to do so.
Can anyone confirm if the strings are writable via the read-write community
string? If an attacker was able to change the configuration and then lock-out
the remote administration capabilities it would create quite a nuisance,
especially if the access point is in a remote location.
Robbie
> On Wed, 17 Feb 2004, NN Poster wrote:
>
> > Linksys WAP55AG does not properly secure SNMP community strings. In
particular, it is possible to obtain all community strings, including
read/write, by querying OID 1.3.6.1.4.1.3955.2.1.13.1.2.
> >
> > 1.3.6.1.4.1.3955.2.1.13.1.2.1 = STRING: "public"
> > 1.3.6.1.4.1.3955.2.1.13.1.2.2 = STRING: "private"
> >
> > Verified on WAP55AG, firmware 1.07
>
> But ... Can you obtain this information without a valid community string?
>
> Hugo.
>
> --
> All email sent to me is bound to the rules described on my homepage.
> hvdkooij@vanderkooij.org http://hvdkooij.xs4all.nl/
> Don't meddle in the affairs of sysadmins,
> for they are subtle and quick to anger.
>
--