TUCoPS :: HP Unsorted D :: tb10853.htm

Deutsche Telekom Speedport w700v broadband router design flaw
Design Flaw in Deutsche Telekom Speedport w700v broadband router
Design Flaw in Deutsche Telekom Speedport w700v broadband router



Hi,
I'd like to inform you about a vulnerability in the Deutsche Telekom Speedport w700v DSL router. Currently it's the standard device that is shipped with new DSL contracts.

I - TITLE

Security advisory: 	Weaknesses in the login process of the web interface
				of the Speedport w700v DSL Router and Wireless LAN
				Access Point

II - SUMMARY

Description: 	A design flaw exists in the login process of the web interface
			of the Speedport w700v DLS Router and Wireless LAN Access Point
			of Deutsche Telekom that might lead to unauthorized access.

Author: Michael Domberg (mdomberg at gmx dot li)

Date: May 11th 2007

Severity: Medium

References: http://www.devtarget.org/speedport700-advisory-05-2007.txt 

III - OVERVIEW

The Speedport w700v is an ADSL/ADSL+ broadband router, Wireless LAN Access Point,
4-Port-Switch and telephone system with integrated firewall and advanced security
features.

More information about the product can be found online at
http://www.t-com.de 

IV - DETAILS

The Speedport firmware consists of some CGI-Scripts that interact with the
hardware and some static html-pages as front-end. The login to the web
interface is designed the same way.
Upon submitting the system password (no username required...) the password
is sent to a cgi-script that verifies the password with internal sources. If
the verification is successful, the welcome screen of the interface is returned.
If the verification failed the login screen is returned. To avoid brute force 
attacks, the login page contains some JavaScript that disables the input field
for a certain amount of seconds. The first attempt is one second delayed, the 
second is two second delayed and any further attempt is delayed for the doubled 
amount of time of the previous one. So the 8th attempt requires the attacker to
wait for about 4 minutes.
By submitting the request directly to the underlying cgi-script and verifying the
result page an attacker can circumvent this mechanism and perform multi-threaded
brute-force attacks. 

V - ANALYSIS

The severity of this vulnerability is to be considered "medium". The default password
of the web interface is "0000". So users often choose a four-digit numeric password, too.
The Speedport 700 series is one of the most-sold DSL modems, because it is the standard
hardware for german DSL users of Deutsche Telekom.
Users can prevent their modems from being exploited this way by disabling remote
administration access (which is the default).

VI - EXPLOIT CODE

An PoC is available, but not published.

VII - WORKAROUND/FIX

Users have to disable remote administration access to prevent their routers from being
exploited.
The vendor doesn't seem to address this vulnerability.

VIII - DISCLOSURE TIMELINE

22. February 2007 - Notified vendor of affected software
28. February 2007 - Vulnerability confirmed
11. May 2007 - Public disclosure

Regards,
Michael Domberg,
www.devtarget.org 

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH