Thecus NAS server N8800 with firmware version 5.03.01, and possibly earlier versions, contains multiple vulnerabilities.
The 7 Elements advisory states that the Thecus NAS server N8800 device contains the following vulnerabilities:
CVE-2013-5667 - Thecus NAS Server N8800 Firmware 5.03.01 get_userid OS Command Injection
The application accepts user input through the get_userid parameter that can be used to create OS commands that are redirected to the operating system. An attacker can use this flaw to execute arbitrary commands.
CVE-2013-5668 - Thecus NAS Server N8800 Firmware 5.03.01
The Domain Administrator Password within the ADS/NT Support page is disclosed due to clear text storage of sensitive information within the GUI. Any user who has access to this page is able to retrieve the ADS/NT administrator ID and password. This could enable an attacker to gain access to the domain hosting the storage server.
CVE-2013-5669 - Thecus NAS Server N8800 Firmware 5.03.01 plain text administrative password
The Administration Web Page transmits passwords in cleartext, which allows remote attackers to sniff the administrative password.
Additional details may be found in the 7 Elements advisory. The CVSS score below is for CVE-2013-5667.
An attacker may be able to execute arbitrary system commands, steal the Domain Administrator credentials, or sniff administrative passwords.
Apply an Update
The vendor has released the following firmware updates to address these vulnerabilities.
ThecusOS 5 (32 bit):
ThecusOS 5 (64 bit):
The vendor claims firmware updates for ThecusOS 6 will be available in a month. If you are unable to upgrade, please consider the following workarounds.
Enable firewall rules to restrict access from untrusted sources.
Vendor| Status| Date Notified| Date Updated
Thecus Tech| | 27 Nov 2013| 23 Jan 2014
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | 10.0 | AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal | 9.5 | E:F/RL:U/RC:C
Environmental | 2.4 | CDP:ND/TD:L/CR:ND/IR:ND/AR:ND
Thanks to David Stubley for reporting this vulnerability.
This document was written by Jared Allar.