Lucene search

K

3com-nmc-tch.txt

🗓️ 17 Aug 1999 00:00:00Reported by Packet StormType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 25 Views

3com NMC has insecure "adm" login with no password after reset, posing security risk.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Date: Mon, 21 Dec 1998 11:23:57 -0800  
From: Entropy <[email protected]>  
Reply-To: Bugtraq List <[email protected]>  
To: [email protected]  
Subject: Fwd: Re: 3com  
  
The software that 3com has developed for running the NMC (network  
management card) for the Total Control Hubs is a bit shady.  
After uploading the software ( as one must do) YOU will notice a login  
account called "adm" with no password.  
Naturally no one wants the "adm" login there, so they delete it from the  
configuration, and go on programming the box. Once the box has been  
programmed and is ready to take calls, it is necessary to save all  
settings, and hardware reset the box, at this point the box is fully  
configured, and ready to  
take calls. The problem is this, the "adm" login requiring no password, is  
still there after the hardware reset!!! It cannot be deleted!  
I have ran a trace route on over 37 ISP's, found there HD box's, and  
have been able to get  
into 21 of them through this security hole!  
The admin that programmed the box has no reason to go back into the  
configuration after doing the  
hardware reset, he has already gone over and double checked his settings,  
they all looked good, and hardware reset has gone into action as the last  
step.., he has no clue that the "adm" he has deleted is still there, and  
active.  
In order to stop the "adm" login one can only dis-able the "adm"  
login, not delete it....this is the only way to stop the login.  
  
I have tested this on the current, and last 3 releases of software put out  
by 3com for the NMC card. 3Com has been notified  
  
I hope this helps.  
  
Entr0py  
  
----------------------------------------------------------------------------  
  
Date: Mon, 21 Dec 1998 23:06:43 -0700  
From: Eric Wanner <[email protected]>  
Reply-To: Bugtraq List <[email protected]>  
To: [email protected]  
Subject: Re: Fwd: Re: 3com  
  
NMC card? The only card you can telnet to is the NAC (Network Access  
Card, I believe). The bug appears to be present on this card.  
  
--  
  
Eric Wanner  
Head Systems Administrator  
FutureOne, Inc.  
602-385-3379  
http://home.futureone.com  
EfNet: holobyte  
  
----------------------------------------------------------------------------  
  
Date: Mon, 21 Dec 1998 22:15:19 -0800  
From: Eric Forcey <[email protected]>  
Reply-To: Bugtraq List <[email protected]>  
To: [email protected]  
Subject: Re: 3com  
  
Actually it's not the NMC card, its the HiPer ARC card.  
  
According to USR/3com personnel it is only affected in v4.1.x revisions  
of the HARC code.  
  
As posted, the fix is to disable the account.  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Aug 1999 00:00Current
7.4High risk
Vulners AI Score7.4
25
.json
Report