ID

VAR-201304-0504


TITLE

Sitecom WLM-3500 Hardcoded User Credentials Multiple Authentication Bypass Vulnerabilities

Trust: 0.9

sources: BID: 59267 // CNNVD: CNNVD-201304-398

DESCRIPTION

Sitecom WLM-3500 has the following backdoor accounts that can be used to bypass security restrictions: Account 1 --------- username: qwertyuiopqwertyuiopqwertyuiopqwertyuiopqwertyuiopqwertyuiopqwertyuiopqw ertyuiopqwertyuiopqwertyuiopqwertyuiopqwertyuiopqwertyui password: 123456789012345678901234567890123456789012345678901234567890123456789012 34567890123456789012345678901234567890123456789012345678 Account 2 --------- username: user3 password: 123456789012345678901234567890123456789012345678901234567890123456789012 34567890123456789012345678901234567890123456789012345678 These accounts can access the "/romfile.cfg" configuration file, obtain the "admin" user password, and control application devices. Sitecom WLM-3500 is a wireless router. There are multiple authentication bypass vulnerabilities in versions prior to Sitecom WLM-3500 1.07 firmware. Attackers can use these vulnerabilities to gain unauthorized access to the device and perform unauthorized operations, which can lead to complete control of the device. Sitecom WLM-3500 is prone to multiple authentication-bypass vulnerabilities

Trust: 1.35

sources: CNVD: CNVD-2013-03589 // CNNVD: CNNVD-201304-398 // BID: 59267

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-03589

AFFECTED PRODUCTS

vendor:sitecommodel:wlm-3500 versionsscope:ltversion:1.07

Trust: 0.6

sources: CNVD: CNVD-2013-03589

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2013-03589
value: HIGH

Trust: 0.6

CNVD: CNVD-2013-03589
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2013-03589

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201304-398

TYPE

Design Error

Trust: 0.3

sources: BID: 59267

PATCH

title:Patch for Sitecom WLM-3500 backdoor account verification bypass vulnerabilityurl:https://www.cnvd.org.cn/patchinfo/show/33479

Trust: 0.6

sources: CNVD: CNVD-2013-03589

EXTERNAL IDS

db:BIDid:59267

Trust: 1.5

db:CNVDid:CNVD-2013-03589

Trust: 0.6

db:CNNVDid:CNNVD-201304-398

Trust: 0.6

sources: CNVD: CNVD-2013-03589 // BID: 59267 // CNNVD: CNNVD-201304-398

REFERENCES

url:http://www.securityfocus.com/archive/1/526372/30/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/bid/59267

Trust: 0.6

url:http://www.sitecom.com

Trust: 0.3

url:http://blog.emaze.net/2013/04/sitecom-wlm-3500-backdoor-accounts.html

Trust: 0.3

sources: CNVD: CNVD-2013-03589 // BID: 59267 // CNNVD: CNNVD-201304-398

CREDITS

Roberto Paleari of Emaze Networks S.p.A

Trust: 0.9

sources: BID: 59267 // CNNVD: CNNVD-201304-398

SOURCES

db:CNVDid:CNVD-2013-03589
db:BIDid:59267
db:CNNVDid:CNNVD-201304-398

LAST UPDATE DATE

2022-05-17T02:03:23.749000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-03589date:2020-03-10T00:00:00
db:BIDid:59267date:2013-04-17T00:00:00
db:CNNVDid:CNNVD-201304-398date:2013-04-19T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-03589date:2013-04-22T00:00:00
db:BIDid:59267date:2013-04-17T00:00:00
db:CNNVDid:CNNVD-201304-398date:2013-04-19T00:00:00