Lucene search

K

rpc3telnet.txt

🗓️ 14 Apr 2005 00:00:00Reported by FlareType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 31 Views

Vulnerability in RPC-3 Telnet Host v3.05 by Bay Technical Associates gives unauthorized users full control of power supplies through a login-bypass issue. Extreme risk due to potential machine shutdown and disablement

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Vulnerability found by Flare@CiSO  
Greets to nolimit, COREiSO, #news, and class101.  
  
Versions Tested:  
RPC-3 Telnet Host - Revision F 3.05, (C) 1998  
  
This is a basic login-bypass vulnerability found in the RPC-3 Telnet  
Host v 3.05 made by "Bay Technical Associates". This telnet daemon is  
used by many hardware appliances, often times power supplies. When a  
user logs into this telnet daemon they are able to gain full control  
of the device (in this example a power supply). We consider this  
vulnerability an extreme risk as it could allow an unauthorized user  
to login to a power supply, and disable power to a machine, thereby  
completely shutting down and disabling the aforementioned machine (or  
anything else connected to such a power supply).  
  
To carry out this exploit an attacker simply needs to telnet to the  
RPC-3 Telnet daemon on the standard telnet port, and when prompted for  
the username hit the escape key, and then enter. The attacker will  
then be logged into the Telnet Daemon.  
  
This attack was tested on RPC-3 Telnet Host version 3.05. Other  
versions were not available for testing; they may or may not prove to  
have the same vulnerability.  
  
Example:  
  
RPC-3 Telnet Host  
Revision F 3.05, (C) 1998  
Bay Technical Associates  
Unit ID: RPC3  
  
Enter username> [escape key] [enter]  
Login successful.  
  
Available RPC3 Outlets  
For command summary, enter HELP  
  
Circuit Breaker: On  
  
Selection Outlet Outlet Power  
Number Name Number Status  
  
RPC3> [attacker now has control of the appliance]  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo