Lucene search

K

unpassworded.dsl.routers.txt

🗓️ 11 Mar 2000 00:00:00Reported by Andrew R. SiverlyType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 44 Views

Router deployment lacks security, risking unauthorized access and control of DSL modems.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
` Kewlhair Security Advisory  
Advisory Name: Router Passwords  
Advisory Released: 03/09/00  
Severity: Moderate  
Summary: An attacker can seize control of an SBC customer=92s router.  
  
  
Overview:  
SBC is currently deploying the Cayman-DSL router to its DSL  
customer=92s.(SBC communications being the parent company for  
Southwestern Bell, Ameritech, Pacific Bell, Nevada Bell, Cellular  
One, and a few more.) With this deployment SBC is neglecting to set  
passwords on the router. Kewlhair has found over 300 of these  
non-pass worded routers.  
  
Description:  
  
Telco engineers often fail to set passwords on DSL modems installed  
at  
Customer sites. The vulnerability affects many different DSL modems.  
The Cayman product is especially vulnerable because it defaults to  
having no Password at all.  
  
As the Telco=92s does often not educate the customers, their modems are  
left vulnerable to intrusion and denial of service events.  
  
Vulnerability:  
  
An individual with malicious intent could easy scan for these devices  
on a DSL providers network, connect to them, and disable them without  
significant effort. In addition, an intruder could disable access to  
the device itself by installing a password (which only they would  
know).  
  
A significant vulnerability is that these devices often can be set  
with  
Static routing tables so packets could be sent through an environment  
where a malicious third party could monitor the traffic.  
  
The Demo:  
  
[ user@xxxx /user]# telnet xxx.xxx.xxx..xxx..  
Trying xxx.xxx.xxx.xxx...  
Connected to xxx.xxx.xxx.xxx.  
Escape character is '^]'.  
  
Terminal shell v1.0  
Cayman-DSL Model 3220-H, DMT-ADSL (Alcatel) plus 4-port hub  
Running GatorSurf version 5.3.0 (build R2)  
( completed login: administrator level)  
  
Cayman-DSLXXXXXX>  
  
  
  
Worse Case:  
Someone writes a script that logs into every one of these routers  
sets the passwords, then changes the ip or kills the interface so it  
no longer works properly. Then causing and SBC engineer to come to  
the home or place of business to fix this problem.  
(I bet that would cost some bucks)  
  
Solutions:  
  
Mandate that the Telco engineers change the default passwords on the  
devices at time of install, and provide literature to the consumer  
advising them of the risks of DSL (or cable) connections to the  
Internet.  
  
Quick solution:  
Set your password on your Cayman router.  
http://cayman.com/security.html#passwordprotect  
  
How do I password protect the Cayman router?  
  
Through the browser:  
1. Browse into the Cayman router.  
2. Click on the " Expert Mode" link.  
  
Through a Telnet session:  
1. First establish a telnet session to the unit or connect serially  
to the console port at 9600 Baud.  
2. At the prompt, type " configure" ( NOTE-all commands are typed  
without quotes) and enter.  
3. At this point you will be at the " top" prompt. Then type "  
system" and enter.  
4. Now you will be at the " system" prompt. Here you type," set  
password" admin and enter.  
5. You will then be prompted for the new password and then be  
prompted to repeat the password. Once you have done this, you will be  
back at the system prompt.  
6. Here you will need to repeat the process, this time for the user  
password, by doing the following steps:  
7. Type, " set password user" and enter. Again you will then be  
prompted for the  
new password an then be prompted to repeat the password. Once this  
is done, you will be at the " system" prompt again.  
Here type," quit" , and you will be prompted, " Save modified  
configuration data [y|n] ?" Type, " yes" and the router is now  
password protected.  
  
NOTE- We recommend that the admin and user password be the same to  
avoid confusion. This approach allows only the admin password to view  
or change the settings.  
  
  
[email protected]  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
11 Mar 2000 00:00Current
7.4High risk
Vulners AI Score7.4
44
.json
Report