BugTraq
Security issues in D-Link DSL-300/DSL-300G+ Broadband Modem/Router Mar 31 2003 03:42PM
Arhont Information Security (infosec arhont com)


Arhont Ltd - Information Security Company

Arhont Advisory by: Andrei Mikhailovsky (www.arhont.com)

Advisory: D-Link DSL Broadband Modem/Router

Router Model Name: D-Link DSL-300G/DSL-300G+

Model Specific: Other models might be vulnerable as well

Manufacturer site: http://www.dlink.com

Manufacturer contact (UK): Tel: 0800 9175063 / 0845

0800288

Contact Date: 06/03/2003

DETAILS:

While performing a general security testing of a

network, we have found several security vulnerability

issues with the D-Link DSL Broadband Modems models:

DSL-300G and DSL-300G+. This issue is similar to the

one found in D-link DSL-500 modem/router

(http://www.securityfocus.com/archive/1/316489/2003-03-27/2003-04-02/0).

Issue 1:

The default router installation enables SNMP (Simple

Network Management Protocol) server with default

community names for read and read/write access. The

models DSL-300G and DSL-300G+ only allow SNMP access

from the LAN (Local Area Network) side.

andrei@whale:~/bugtraq/DSL-modems$ snmpwalk -Os -c

public 192.168.0.1 -v 1

sysDescr.0 = STRING: D-Link DSL-300G+ version 7.1.0.30

ANNEXA (Oct 18 2002) R2.05.b4t9uk

Copyright (c) 2000 Dlink Corp.

sysObjectID.0 = OID: enterprises.171.10.30.1

sysUpTime.0 = Timeticks: (27941701) 3 days, 5:36:57.01

...

...

The community name: public

allows read access to the mentioned devices, allowing

enumeration and gathering of sensitive network

information.

The community name: private

allows read/write access to devices, thus allowing

change of the network settings of the broadband modem.

Impact: This vulnerability allows local malicious

attackers to retrieve and change network settings of

the modem.

Risk Factor: Medium/High

Possible Solutions:

1. Firewall UDP port 161 from LAN/WAN sides, as it is

not possible to disable SNMP service from the web

management interface.

2. You can change or disable snmp default settings by

connecting to the modem/router using telnet with

password string: "private". (This solution has been

pointed out by Snowy Maslov <Snowy.Maslov (at) fujitsu.com (dot) au [email concealed]>)

Issue2:

Default remote administration access password via

telnet can not be changed during the setup via web

interface. Even after configuring the modem in web

interface and changing default password, malicious

attackers can access the unit with telnet and default

administrator password "private".

Fisk Factor: Medium/High

Possible Solutions: Manually change the default

password via telnet and reboot the modem.

Issue 3:

The ISP account information including login name and

password is stored on the modem without encryption, It

is therefore possible to retrieve this information with

simple SNMP gathering utility such as snmpwalk:

andrei@whale:~/bugtraq/DSL-modems$ snmpwalk -Os -c

public 192.168.0.1 -v 1

sysDescr.0 = STRING: D-Link DSL-300G+ version 7.1.0.30

ANNEXA (Oct 18 2002) R2.05.b4t9uk

Copyright (c) 2000 Dlink Corp.

sysObjectID.0 = OID: enterprises.171.10.30.1

...

...

...

transmission.23.2.3.1.5.2.1 = STRING:

"username@dsl-provider"

...

...

transmission.23.2.3.1.6.2.1 = STRING: "password-string"

...

...

...

Impact: This vulnerability allows LAN malicious

attackers to retrieve confidential information.

Risk Factor: Very High

Possible Solutions: As a temporary solution you should

firewall UDP port 161 from LAN sides, as it is not

possible to disable SNMP service from the web

management interface.

According to the Arhont Ltd. policy, all of the found

vulnerabilities and security issues will be reported to

the manufacturer 7 days before releasing them to the

public domains (such as CERT and BUGTRAQ), unless

specifically requested by the manufacturer.

If you would like to get more information about this

issue, please do not hesitate to contact Arhont team.

Kind Regards,

Andrei Mikhailovsky

Arhont Ltd

http://www.arhont.com

GnuPG Keyserver: blackhole.pca.dfn.de

GnuPG Key: 0xFF67A4F4

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus