what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

raidsonic-disclose.txt

raidsonic-disclose.txt
Posted Mar 17, 2008
Authored by Collin Mulliner | Site mulliner.org

RaidSonic version 2.6.0-n stores the encryption key in plain text on an unencrypted partition.

tags | exploit, info disclosure
SHA-256 | 7236f5bb5c52ecb5f0e6dac6ef96f1543f48c62d8f7ac948c37e43a6bc110d9b

raidsonic-disclose.txt

Change Mirror Download

Manufacturer: RaidSonic (www.raidsonic.de)
Device: NAS-4220-B
Firmware: 2.6.0-n(2007-10-11)
Device Type: end user grade NAS box
OS: Linux 2.6.15
Architecture: ARM
Designed by: Storm Semiconductor Inc (www.storlinksemi.com)


Problem:
Hard disk encryption key stored in plain on unencrypted partition.


Time line:
Found: 09. March 2008
Reported: 09. March 2008
Disclosed: 16. March 2008


Summary:
The NAS-4220-B offers disk encryption through it's web interface. The
key used for encrypting the disk(s) is stored on a unencrypted
partition. Therefore one can extract the encryption key by removing
the disk from the NAS and reading the value from the unencrypted
partition. The key itself is stored in a file in plain (base64
encoded). Therefore the NAS-4220 crypt disk support can not be
considered secure.


Details:
The NAS-4220-B can hold two SATA disks. Disk are encrypted through a
loop back device using AES128. The problem came to my attention when
I could access the NAS after reboot without suppling the hard disk key.

The key is stored in /system/.crypt, "/system" is a small
configuration partition on the same disk that holds the encrypted
partition. The system partition is created by the system software
running on the NAS-4220. The configuration partition of the second
hard disk is not mounted by default but also contains the .crypt file
holding the key for the encrypted partition on the same disk.


Accessing the key (key value is the example I used):
$ cat /system/.crypt
MTIzNDU2Nzg5MDEyMzQ1Njc4OTA=

key in plain key in base64
12345678901234567890 MTIzNDU2Nzg5MDEyMzQ1Njc4OTA=


Base64 decode:
#!/usr/bin/python
from base64 import *
print b64decode("MTIzNDU2Nzg5MDEyMzQ1Njc4OTA=")


Reported by:
Collin Mulliner <collin(AT)betaversion.net >




Collin's Advisories: http://www.mulliner.org/security/advisories/

--
Collin R. Mulliner <collin@betaversion.net>
BETAVERSiON Systems [www.betaversion.net]
info/pgp: finger collin@betaversion.net
If you have to run heating in winter, you don't own enough computers.
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close