|
Vulnerability N-Base switches Affected Systems using N-Base switches Description Following text is based on The Telecom Security Group Advisory. Note that N Base products are also OEM'd to DEC, Allied Telesyn, Lantronix, Intel, and Black Box (and presumably others). Some of these companies no longer use N Base gear, but may have sold products in the past that are affected. The only way to find out if a given OEM box is really an affected N Base unit is to try one of the exploits. The <any username>/forgot is probably the best test. Problem 1: ========== Many (all?) N Base managed products have "back door" passwords which cannot be disabled. These apply to both the serial console port and the telnet con- sole port (if enabled). The username/password combinations are: Username Password <any> forgot <any> debug Both of these combinations grant full access to the switch - in particular, any of the switch parameters can be changed, including the password. Further, the "debug" password allows reading of various internal registers. Issuing some debug commands can cause the switch to lock up, requiring a complete power cycle to reset. Lastly, with these passwords it is possible to overwrite the switch operational software, leaving the switch in an unbootable mode. Depending on the switch model, a return to the factory may be necessary, though this was not investigated yet. This problem has been verified on the NH208, NH215, and NH2016 switches and it is believed to be present on all managed N Base switches. Problem 2: ========== N Base switches that implement a default TFTP server can have the server operational software or (possibly) parameters overwritten by anyone who knows the IP address of the switch and has an IP path to the switch. N Base switches with a default TFTP server have standard filenames for their operational software and parameters. For example, a NH208 uses a software file named FLASH08.HEX and a parameter file named PARAM08.PAR. The switch will accept a TFTP load of any data as long as the file name matches. In the case of the operating software, the currently running software will be erased, the new software flashed, and the switch restarted. If the software is not a valid operating software for the switch, the switch will appear dead, usually with the FAULT LED illuminated. An unsuspecting user might return the switch to N Base for repair, but in any event this will cause substantial inconvenience. The proper operational software can be uploaded to the switch via the serial port, assuming that the user has the loader utility and switch software which may be available from ftp://ftp.nbase.com It may be possible to make similar attacks against the parameter file, which could then be used to compromise VLANs (by removing VLAN partitioning in the switch) or for denial-of-service attacks (by changing ports to incompatible operating modes). This has not been verified. This problem has been verified on the NH208 and NH215 switches. It is not present on the NH2016 switch unless the switch has been changed to a TFTP server with the "set-tftp-mode" command. If your switch has the "get-tftp-mode" command and it reports "Tftp client will be operate on next software download" then your switch should not be vulnerable to this problem. Some switch firmware has been released with a useless "fix", but other switches have not had a new release, and no discernable effort has been made to inform N Base custom- ers of this critical security flaw. The "fix" that N Base has implemented is to simply change the former debug password of "debug" to the new debug password of "debug0" and the former lost password recovery password of "forgot" to the new recovery password of "forgotten". Solution Currently, supported switches with the following ROM updates do have real fixes for password/tftp problems (for MegaSwitch II): Model ROM NH2012 2.54 NH2012R 2.54 NH2015 2.51 NH2048 1.33 With these configurations you can do the following to fix these problems: set-full-sec enable (this disables the backdoor passwords) set-sw-file XXX (where XXX is the name you want to call your SNMP software update file) set-par-file XXX (where XXX is the name you want to call your parameters file) set-passwd <return> (this will display a prompt to enter a new password) set-comm read XXX (where XXX is the new read community) set-comm write XXX (where XXX is the new write community) These steps should secure the mentioned MegaSwitch II configurations. For GigaFrame Switch: NH3012 2.1 set-full-sec enabled set-sw-file XXX set-par-file XXX set-comm read XXX set-comm write XXX set-passwd <return> del-user user (By default there are two users "super", and "user". "super" has supervisor priveldges, "user" is just a default. To secure the system, you should delete the "user" account.)