ID

VAR-200704-0456


CVE

CVE-2007-2332


TITLE

Nortel VPN Router Password acquisition vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2007-003767

DESCRIPTION

Nortel VPN Router (aka Contivity) 1000, 2000, 4000, and 5000 before 6_05.140 uses a fixed DES key to encrypt passwords, which allows remote authenticated users to obtain a password via a brute force attack on a hash from the LDAP store. Nortel VPN routers are prone to multiple remote unauthorized-access vulnerabilities due to design errors. Successful exploits will allow attackers to access administrative functionality and completely compromise vulnerable devices or gain direct access to the private network. This issue affects all model numbers for Nortel VPN Routers 1000, 2000, 4000, 5000. Nortel VPN routers were formerly known as Contivity. Nortel VPN routers provide routing, VPN, firewall, bandwidth management, encryption, authentication, and data integrity functions for secure connections over IP networks and the Internet. ---------------------------------------------------------------------- Secunia customers receive relevant and filtered advisories. Delivery is done via different channels including SMS, Email, Web, and https based XML feed. http://corporate.secunia.com/trial/38/request/ ---------------------------------------------------------------------- TITLE: Nortel VPN Router Default User Accounts and Missing Authentication Checks SECUNIA ADVISORY ID: SA24962 VERIFY ADVISORY: http://secunia.com/advisories/24962/ CRITICAL: Moderately critical IMPACT: Security Bypass, Manipulation of data WHERE: >From remote OPERATING SYSTEM: Nortel Contivity VPN Switches http://secunia.com/product/2425/ Nortel VPN Routers http://secunia.com/product/2426/ DESCRIPTION: A vulnerability and a security issue have been reported in Nortel VPN Routers, which can be exploited by malicious people to bypass certain security restrictions or manipulate certain data. 1) Two default user accounts ("FIPSecryptedtest1219" and "FIPSunecryptedtest1219") are configured on the VPN Router, which are not readily visible to the system manager. 2) Missing authentication checks within two template files of the web management tool can be exploited to e.g. modify certain router configurations. The vulnerability and security issue reportedly affect the following products: * Contivity 1000 VPN Switch * Contivity 2000 VPN Switch * Contivity 4000 VPN Switch * VPN Router 5000 *VPN Router Portfolio SOLUTION: Update to versions 6_05.140, 5_05.304, or 5_05.149. PROVIDED AND/OR DISCOVERED BY: The vendor credits Detack GmbH. ORIGINAL ADVISORY: Nortel: http://www130.nortelnetworks.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=567877&RenditionID=&poid=null ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-2332 // JVNDB: JVNDB-2007-003767 // BID: 23562 // VULHUB: VHN-25694 // PACKETSTORM: 56107

AFFECTED PRODUCTS

vendor:nortelmodel:vpn router 1010scope: - version: -

Trust: 1.4

vendor:nortelmodel:vpn router 1050scope: - version: -

Trust: 1.4

vendor:nortelmodel:vpn router 1100scope: - version: -

Trust: 1.4

vendor:nortelmodel:vpn router 1700scope: - version: -

Trust: 1.4

vendor:nortelmodel:vpn router 1740scope: - version: -

Trust: 1.4

vendor:nortelmodel:vpn router 1750scope: - version: -

Trust: 1.4

vendor:nortelmodel:vpn router 2700scope: - version: -

Trust: 1.4

vendor:nortelmodel:vpn router 5000scope: - version: -

Trust: 1.4

vendor:nortelmodel:vpn router 1700scope:eqversion:*

Trust: 1.0

vendor:nortelmodel:vpn router 1050scope:eqversion:*

Trust: 1.0

vendor:nortelmodel:vpn router 1740scope:eqversion:*

Trust: 1.0

vendor:nortelmodel:vpn router 1750scope:eqversion:*

Trust: 1.0

vendor:nortelmodel:vpn router 2700scope:eqversion:*

Trust: 1.0

vendor:nortelmodel:vpn router 5000scope:eqversion:*

Trust: 1.0

vendor:nortelmodel:vpn router 1010scope:eqversion:*

Trust: 1.0

vendor:nortelmodel:vpn router 1100scope:eqversion:*

Trust: 1.0

vendor:nortelmodel:networks vpn routerscope:eqversion:5000

Trust: 0.3

vendor:nortelmodel:networks vpn routerscope:eqversion:2700

Trust: 0.3

vendor:nortelmodel:networks vpn routerscope:eqversion:17500

Trust: 0.3

vendor:nortelmodel:networks vpn routerscope:eqversion:1740

Trust: 0.3

vendor:nortelmodel:networks vpn routerscope:eqversion:1700

Trust: 0.3

vendor:nortelmodel:networks vpn routerscope:eqversion:1100

Trust: 0.3

vendor:nortelmodel:networks vpn routerscope:eqversion:1050

Trust: 0.3

vendor:nortelmodel:networks vpn routerscope:eqversion:1010

Trust: 0.3

vendor:nortelmodel:networks contivity vpn switchscope:eqversion:4000

Trust: 0.3

vendor:nortelmodel:networks contivity vpn switchscope:eqversion:2000

Trust: 0.3

vendor:nortelmodel:networks contivity vpn switchscope:eqversion:1000

Trust: 0.3

sources: BID: 23562 // JVNDB: JVNDB-2007-003767 // CNNVD: CNNVD-200704-574 // NVD: CVE-2007-2332

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2332
value: HIGH

Trust: 1.0

NVD: CVE-2007-2332
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200704-574
value: CRITICAL

Trust: 0.6

VULHUB: VHN-25694
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-2332
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-25694
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-25694 // JVNDB: JVNDB-2007-003767 // CNNVD: CNNVD-200704-574 // NVD: CVE-2007-2332

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-2332

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200704-574

TYPE

Design Error

Trust: 0.9

sources: BID: 23562 // CNNVD: CNNVD-200704-574

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-003767

PATCH

title:Top pageurl:http://www.nortel-canada.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-003767

EXTERNAL IDS

db:NVDid:CVE-2007-2332

Trust: 2.8

db:BIDid:23562

Trust: 2.0

db:SECUNIAid:24962

Trust: 1.8

db:VUPENid:ADV-2007-1464

Trust: 1.7

db:JVNDBid:JVNDB-2007-003767

Trust: 0.8

db:CNNVDid:CNNVD-200704-574

Trust: 0.7

db:VULHUBid:VHN-25694

Trust: 0.1

db:PACKETSTORMid:56107

Trust: 0.1

sources: VULHUB: VHN-25694 // BID: 23562 // JVNDB: JVNDB-2007-003767 // PACKETSTORM: 56107 // CNNVD: CNNVD-200704-574 // NVD: CVE-2007-2332

REFERENCES

url:http://www.securityfocus.com/bid/23562

Trust: 1.7

url:http://secunia.com/advisories/24962

Trust: 1.7

url:http://www130.nortelnetworks.com/go/main.jsp?cscat=bltndetail&documentoid=567877&renditionid=&poid=null

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/1464

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2332

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-2332

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/1464

Trust: 0.6

url:http://www.nortelnetworks.com/products/01/contivity/index.html

Trust: 0.3

url:http://www.nortel.com/

Trust: 0.3

url:http://www116.nortelnetworks.com/pub/repository/clarify/document/2007/16/022181-01.pdf

Trust: 0.3

url:http://www130.nortelnetworks.com/go/main.jsp?cscat=bltndetail&documentoid=567877&renditionid=&poid=null

Trust: 0.1

url:http://secunia.com/advisories/24962/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://corporate.secunia.com/trial/38/request/

Trust: 0.1

url:http://secunia.com/product/2426/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/2425/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-25694 // BID: 23562 // JVNDB: JVNDB-2007-003767 // PACKETSTORM: 56107 // CNNVD: CNNVD-200704-574 // NVD: CVE-2007-2332

CREDITS

Detack GmbH

Trust: 0.6

sources: CNNVD: CNNVD-200704-574

SOURCES

db:VULHUBid:VHN-25694
db:BIDid:23562
db:JVNDBid:JVNDB-2007-003767
db:PACKETSTORMid:56107
db:CNNVDid:CNNVD-200704-574
db:NVDid:CVE-2007-2332

LAST UPDATE DATE

2025-04-10T23:01:15.566000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-25694date:2011-03-08T00:00:00
db:BIDid:23562date:2016-07-06T14:39:00
db:JVNDBid:JVNDB-2007-003767date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200704-574date:2007-04-27T00:00:00
db:NVDid:CVE-2007-2332date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-25694date:2007-04-27T00:00:00
db:BIDid:23562date:2007-04-19T00:00:00
db:JVNDBid:JVNDB-2007-003767date:2012-09-25T00:00:00
db:PACKETSTORMid:56107date:2007-04-20T21:50:15
db:CNNVDid:CNNVD-200704-574date:2007-04-27T00:00:00
db:NVDid:CVE-2007-2332date:2007-04-27T16:19:00