ID

VAR-200708-0254


CVE

CVE-2007-4361


TITLE

NETGEAR ReadyNAS RAIDiator default root user password vulnerability

Trust: 1.2

sources: CNVD: CNVD-2007-4989 // CNNVD: CNNVD-200708-247

DESCRIPTION

NETGEAR (formerly Infrant) ReadyNAS RAIDiator before 4.00b2-p2-T1 beta creates a default SSH root password derived from the hardware serial number, which makes it easier for remote attackers to guess the password and obtain login access. ReadyNAS is a direct-attached storage device based on Linux and debian-sparc platforms.  ReadyNAS has two users enabled by default, one is admin (the default password is infrant1) and the other is root. Each time it starts, it uses a hard-coded algorithm to generate the root password, which uses the Ethernet MAC address and software version number. And a hash of the shared secret. The root password cannot be changed permanently, so it is reset every time it is started.  The ReadyNAS device boots from the built-in flash memory, and the Linux kernel and the initrd image are in this flash memory. At startup, the initrd image will look for the installed hard disk and initialize it. If an uninitialized hard disk is found, it will be added to the RAID array. A part of the hard disk will be used as the root file system. A tarball stored in the flash will initialize it.  After loading the rootfs, some consistency checks are performed, and some important configuration files are encrypted and backed up. These files cannot be changed without decryption.  At startup, the / linuxrc file in the initrd image is first executed as follows:  --------------  SEED1 = `/ sysroot / sbin / ifconfig eth0 | grep HWaddr | sed -e 's /.* HWaddr //'  --e 's / // g'`  SEED2 = `cut -f2 -d = / sysroot / etc / raidiator_version | cut -f1 -d,`  [* EDIT *: removed SEED3 as friendly requested by vendor]  echo "root:` echo \ "$ SEED1 $ SEED2 $ SEED3 \" | md5sum | cut -f1 -d '' `" |  chpasswd  # TAKE ME OUT !!  [-s /sysroot/.os_passwd] && echo "root:` / sysroot / usr / bin / head -1  / sysroot / .os_passwd` "| chpasswd  #################  / sysroot / bin / mv / etc / passwd / sysroot / etc / passwd 2> $ ERR  rm -rf / sysroot / etc / hosts_equiv /sysroot/root/.rhosts  /sysroot/root/.ssh/* 2> $ ERR  --------------  The password is initialized by md5 and the following components:  a.) MAC address obtained from ifconfig  b.) Software version number read from / etc / raidiator_version  c.) Shared keychain in SEED3  Even though the root password varies from device to device (the MAC address is also part of the hash), it is still not secret. First, if the NAS device is in the local LAN, you can query the MAC address through ARP request. Second, the default host name is nas-xx-yy-zz (which can be displayed on the https-based interface), and xx, yy, zz It is the last 3 octal digits of the MAC address; finally, the version of the software can be determined by brute force guessing. Successfully exploiting this issue allows remote attackers to gain superuser-level access to affected devices. This issue affects devices with firmware versions 3.01c1-p1 and 3.01c1-p6 installed; other versions may also be affected. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Infrant ReadyNAS Devices SSH Default Root Password Weakness SECUNIA ADVISORY ID: SA26442 VERIFY ADVISORY: http://secunia.com/advisories/26442/ CRITICAL: Not critical IMPACT: Security Bypass WHERE: >From remote OPERATING SYSTEM: Infrant ReadyNAS Devices 3.x http://secunia.com/product/15287/ DESCRIPTION: Brian Chapados and Felix Domke have reported a weakness in Infrant ReadyNAS devices, which can be exploited by malicious people to bypass certain security restrictions. The problem is that the device includes an SSH daemon that cannot be disabled and that the password for the SSH root account on the device is generated using certain device-specific values (e.g. MAC address, serial number, version number) and cannot be changed permanently. The weakness is reported in ReadyNAS devices with RAIDiator 3.01c1-p1, 3.01c1-p6. SOLUTION: The vendor has provided the ToggleSSH add-on to disable/enable SSH on the device and has released RAIDiator 4.00b2-p2-T1 beta version, which has SSH disabled by default. http://www.infrant.com/download/addons/ToggleSSH_1.0.bin http://www.infrant.com/beta/raidiator/4.0/RAIDiator-4.00b2-p2-T1 PROVIDED AND/OR DISCOVERED BY: Brian Chapados and Felix Domke ORIGINAL ADVISORY: Infrant Technologies: http://www.infrant.com/forum/viewtopic.php?t=12313 http://www.infrant.com/forum/viewtopic.php?t=12249 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2007-4361 // JVNDB: JVNDB-2007-004281 // CNVD: CNVD-2007-4989 // BID: 25290 // VULHUB: VHN-27723 // PACKETSTORM: 58544

AFFECTED PRODUCTS

vendor:netgearmodel:readynas raidiatorscope:eqversion:3.01c1-p6

Trust: 1.6

vendor:netgearmodel:readynas raidiatorscope:eqversion:3.01c1-p1

Trust: 1.6

vendor:net gearmodel:readynas raidiatorscope:ltversion:4.00b2-p2-t1 beta

Trust: 0.8

vendor:nonemodel: - scope: - version: -

Trust: 0.6

vendor:netgearmodel:readynas raidiator 3.01c1-p6scope: - version: -

Trust: 0.3

vendor:netgearmodel:readynas raidiator 3.01c1-p1scope: - version: -

Trust: 0.3

vendor:netgearmodel:readynas raidiatorscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2007-4989 // BID: 25290 // JVNDB: JVNDB-2007-004281 // CNNVD: CNNVD-200708-247 // NVD: CVE-2007-4361

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4361
value: HIGH

Trust: 1.0

NVD: CVE-2007-4361
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200708-247
value: CRITICAL

Trust: 0.6

VULHUB: VHN-27723
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-4361
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27723
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27723 // JVNDB: JVNDB-2007-004281 // CNNVD: CNNVD-200708-247 // NVD: CVE-2007-4361

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-4361

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200708-247

TYPE

Design Error

Trust: 0.9

sources: BID: 25290 // CNNVD: CNNVD-200708-247

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-004281

PATCH

title:Top Pageurl:http://www.netgear.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-004281

EXTERNAL IDS

db:NVDid:CVE-2007-4361

Trust: 3.4

db:BIDid:25290

Trust: 2.0

db:SECUNIAid:26442

Trust: 1.8

db:SREASONid:3017

Trust: 1.7

db:OSVDBid:36357

Trust: 1.7

db:JVNDBid:JVNDB-2007-004281

Trust: 0.8

db:CNVDid:CNVD-2007-4989

Trust: 0.6

db:BUGTRAQid:20070813 DEFAULT ROOT PASSWORD IN INFRANT (NOW NETGEAR) READYNAS "RAIDIATOR"

Trust: 0.6

db:XFid:36011

Trust: 0.6

db:CNNVDid:CNNVD-200708-247

Trust: 0.6

db:VULHUBid:VHN-27723

Trust: 0.1

db:PACKETSTORMid:58544

Trust: 0.1

sources: CNVD: CNVD-2007-4989 // VULHUB: VHN-27723 // BID: 25290 // JVNDB: JVNDB-2007-004281 // PACKETSTORM: 58544 // CNNVD: CNNVD-200708-247 // NVD: CVE-2007-4361

REFERENCES

url:http://www.infrant.com/forum/viewtopic.php?t=12313

Trust: 2.1

url:http://www.infrant.com/forum/viewtopic.php?t=12249

Trust: 1.8

url:http://www.securityfocus.com/bid/25290

Trust: 1.7

url:http://www.osvdb.org/36357

Trust: 1.7

url:http://secunia.com/advisories/26442

Trust: 1.7

url:http://securityreason.com/securityalert/3017

Trust: 1.7

url:http://www.infrant.com/forum/viewtopic.php?t=3366&start=30

Trust: 1.6

url:http://www.securityfocus.com/archive/1/476266/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/36011

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4361

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4361

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/476266/100/0/threaded

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/36011

Trust: 0.6

url:http://www.infrant.com/products/products.php

Trust: 0.3

url:/archive/1/476266

Trust: 0.3

url:http://www.infrant.com/forum/viewtopic.php?t=3366&start=30

Trust: 0.1

url:http://secunia.com/product/15287/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://www.infrant.com/download/addons/togglessh_1.0.bin

Trust: 0.1

url:http://secunia.com/advisories/26442/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.infrant.com/beta/raidiator/4.0/raidiator-4.00b2-p2-t1

Trust: 0.1

sources: VULHUB: VHN-27723 // BID: 25290 // JVNDB: JVNDB-2007-004281 // PACKETSTORM: 58544 // CNNVD: CNNVD-200708-247 // NVD: CVE-2007-4361

CREDITS

Brian Chapados brian@chapados.org Felix Domke tmbinc@elitedvb.net

Trust: 0.6

sources: CNNVD: CNNVD-200708-247

SOURCES

db:CNVDid:CNVD-2007-4989
db:VULHUBid:VHN-27723
db:BIDid:25290
db:JVNDBid:JVNDB-2007-004281
db:PACKETSTORMid:58544
db:CNNVDid:CNNVD-200708-247
db:NVDid:CVE-2007-4361

LAST UPDATE DATE

2025-04-10T23:19:59.783000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2007-4989date:2007-08-13T00:00:00
db:VULHUBid:VHN-27723date:2018-10-15T00:00:00
db:BIDid:25290date:2015-05-07T17:36:00
db:JVNDBid:JVNDB-2007-004281date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200708-247date:2007-08-16T00:00:00
db:NVDid:CVE-2007-4361date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CNVDid:CNVD-2007-4989date:2007-08-13T00:00:00
db:VULHUBid:VHN-27723date:2007-08-15T00:00:00
db:BIDid:25290date:2007-08-13T00:00:00
db:JVNDBid:JVNDB-2007-004281date:2012-09-25T00:00:00
db:PACKETSTORMid:58544date:2007-08-14T17:37:33
db:CNNVDid:CNNVD-200708-247date:2007-08-15T00:00:00
db:NVDid:CVE-2007-4361date:2007-08-15T19:17:00