what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

netopia.advisory.r9100

netopia.advisory.r9100
Posted May 17, 2000
Authored by Steve Friedl

The Netopia R9100 permits a user not authorized with a special security password to neverthless modify the SNMP community strings, including enabling SNMP access that should be disabled.

tags | exploit
SHA-256 | 3168f68634d059aaa9ea3f13c15e52e139e10b5ab83eef2a37fba5ca881c8d62

netopia.advisory.r9100

Change Mirror Download
Security Advisory: Netopia R9100 DSL router

By: Stephen Friedl (steve@unixwiz.net)
Date: 8 May 2000

Short summary:

The Netopia R9100 permits a user not authorized with a
special security password to neverthless modify the SNMP
community strings, including enabling SNMP access that should
be disabled.

Device Summary:

The Netopia R9100 is an Ethernet-to-Ethernet router intended
mainly for the DSL and cable modem markets, and it supports
NAT and various kinds of tunneling. It is managed with telnet,
HTTP, and with SNMP from either the inside or the outside
Ethernet interfaces.

Product information on this device can be found at:

http://www.netopia.com/equipment/routers/r9100/

One of the many setup screens permits the setting of SNMP
community names, both RO and RW, and setting the entries
to blanks effectively disables SNMP access. The security
setup screen (which requires a separate password from that
used during login) can be configured to restrict access to
any of the SNMP screens.

Vulnerability:

The R9100 has a command-line mode that is reached by typing
control-N after the user has passed the initial login test.
At the "#" prompt one can then do most management of the device.
This includes the setting of SNMP community strings in spite
of the limitation imposed by the administrator:

# set snmp community RO wookie
or
# set snmp community RW wookie

Impact:
Relatively low. The exploit can only be attempted by those
with existing access login to the device, and it doesn't seem
terribly common to have users allowed to manage nearly everything
except the SNMP strings.

Workaround:
Deny access to users who can't be trusted.

Versions Tested:
v4.6.2 (the latest) is the only version tested. Older
versions probably vulnerable also.
Other similar Netopia products possibly vulnerable also

Response from Netopia:

The new behavior will be when SNMP access is disabled in the
Security screen, and an attempt is made to configure the SNMP
read-write string via the Command Line and Telnet, the user
will get an error: -400 Access Denied.

This fix will be in the next release of firmware, version 4.7
(approx. end of May)

Steve

---
Stephen J Friedl|Software Consultant|Tustin, CA| +1 714 544-6561
3B2-kind-of-guy |I speak for me only| KA8CMY |steve@unixwiz.net
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    10 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close