exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Zyxel MAX3XX Series Wimax CPEs Hardcoded Root Password

Zyxel MAX3XX Series Wimax CPEs Hardcoded Root Password
Posted Mar 23, 2016
Authored by Gianni Carabelli

Plain text hardcoded passwords have been discovered in /bin/busybox and /bin/dropbear for Zyxel MAX3XX series Wimax CPEs.

tags | exploit
SHA-256 | 1bc5c071cbf8b319d60aa2b1977e287555fe15a20c2bad788a3e9e49ae3bc5e6

Zyxel MAX3XX Series Wimax CPEs Hardcoded Root Password

Change Mirror Download
########################################
#Vulnerability Title: Hardcoded root password in Zyxel MAX3XX series
Wimax CPEs
#Date: 23/03/2016
#Product: Zyxel MAX3XX series CPEs
#Vendor: www.zyxel.com
#Affected Firmware: Latest version at the time of disclosure v 2.00 and
below (tested)
#Patch: Unpatched
#Vendor contact date: 12/12/2015
#Authored by: Gianni Carabelli <giannicarabelli (at) gmail.com>
########################################


#Introdution
Zyxel produces some IEEE 802.16e CPE devices. These devices are usually
owned by ISP, that grant the usage to the subscriber.
Subscriber can't usually login with admin privileges on the devices, due
to ISP policy, but only with less privileges (guest user).

#Technical details:

Affected models suffer CWE-25 for telnet, ssh, serial access.
In /bin/busybox and /bin/dropbear there are hardcoded plain text
passwords, easily discoverable reading the binaries.
These binaries are not readable by web interface, so to analyze the
firmware there are only two known ways:
* dumping the firmware via jtag
* download the binary firmware from the vendor site, unpack and analyze it

In the login process, the standard /bin/shadow is not honored at all, so
dropbear or busybox are doing something strange to do authentication.

The binaries busybox and dropbear are located on a squashfs filesystem
(so a readonly fs).
This filesystem is mounted via loopback and lives in a file (/etc/initrd).
/etc is the mountpoint of a jffs2 (rw) partition.

User with hardcoded password are "root" (uid 0) and another one (usually
"mfgroot" with uid 0)

Password discover example:

wget 'ftp://ftp.zyxel.com/MAX318M/firmware/MAX318M_2.00(UUA.1)D0.zip'
unzip MAX*zip
tar xvfz 200UUA1D0/ras/200UUA1D0.bin
binwalk -e initrd
strings `find -name busybox` |grep -A 10 Password


#Affected devices:

MAX208
MAX218
MAX306
MAX318
HES319

# Other devices that may run the same software:
GREENPACKET WIMAX CPE - unknown models (untested)
Huawei wimax CPE BMxxx (untested)
Other mt710x devices

#Impact
It is a ISP decision to leave ssh/telnet open or not.
Usually ftp is always open for maintenance, but often also the other
ones are open.
Due to reflashing the CPE by ftp is allowed, a malicious user can take
control of the CPE uploading a modified firmware via ftp.
If ISP leave also ssh or telnet open a malicious user take easily
control over the device without any reflash.

#The worst

* The device is no more actively supported, but still in production in
large scale.
* On the filesystem, there is also tcpdump, so subscriber LAN (eth0) are
not at safe. All pc and connected devices, can be sniffed.
* Playing with ARP tables or DNS proxy, already on the board, it easily
possible to perform MITM attacks.
* Some ISP offer natted internet access, so malicious user may operate
only in LAN, using private IP. But some ISP offer dinamic public IP, or
premium public fixed IP, so wmx0 of the device has an assigned internet
IP. Scanning the ISP ip class, may reveal critical situations
* Due to ISP buy these devices in stock, a high percentage of the
subscriber devices may be one of the affected ones, if ISP chose that
vendor as device provider.


#Mitigation

End user (subscriber) can't do anything do protect his network from this
vulnerability.
Due to the binaries are on a squashfs only a reflash of the CPE, done by
ISP, can fix the problem.
At the moment, no firmware for these devices are known to be without the
hardcoded password.
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close