ID

VAR-201804-0675


CVE

CVE-2018-10576


TITLE

plural WatchGuard Authentication vulnerabilities in device software

Trust: 0.8

sources: JVNDB: JVNDB-2018-004986

DESCRIPTION

An issue was discovered on WatchGuard AP100, AP102, and AP200 devices with firmware before 1.2.9.15. Improper authentication handling by the native Access Point web UI allows authentication using a local system account (instead of the dedicated web-only user). WatchGuard AP100 , AP102 ,and AP200 An authentication vulnerability exists in the device software.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. WatchGuardAP100, AP102 and AP200 are different series of indoor wireless access point devices from WatchGuard. A security vulnerability exists in WatchGuardAP100, AP102, and AP200 using firmware prior to 1.2.9.15, which stems from the failure of the local AccessPoint WebUI to properly handle authentication. An attacker can use this vulnerability to gain access to an AP device with the help of a local system account. Introduction ============ Multiple vulnerabilities can be chained together in a number of WatchGuard AP products which result in pre-authenticated remote code execution. The vendor has produced a knowledge-base article[1] and announcement[2] regarding these issues. ZX Security would like to commend the prompt response and resolution of these reported issues by the vendor. Product ======= Several WatchGuard Access Points running firmware before v1.2.9.15 are affected, including: * AP100 * AP102 * AP200 The AP300 is also affected by issues 2, 3 and 4 when running firmware before 2.0.0.10. The latest firmware update resolves these issues. Technical Details ================= 1) Hard-coded credentials ------------------------- CVE-2018-10575 A hard-coded user exists in /etc/passwd. The vendor has requested the specific password and hash be withheld until users can apply the patch. There is no way for a user of the access point to change this password. An attacker who is aware of this password is able to access the device over SSH and pivot network requests through the device, though they may not run commands as the shell is set to /bin/false. 2) Hidden authentication method in web interface allows for authentication bypass --------------------------------------------------------------------------------- CVE-2018-10576 The standard authentication method for accessing the webserver involves submitting an HTML form. This uses a username and password separate from the standard Linux based /etc/passwd authentication. An alternative authentication method was identified from reviewing the source code whereby setting the HTTP headers AUTH_USER and AUTH_PASS, credentials are instead tested against the standard Linux /etc/passwd file. This allows an attacker to use the hardcoded credentials found previously (see 1. Hard-coded credentials) to gain web access to the device. An example command that demonstrates this issue is: curl https://watchguard-ap200/cgi-bin/luci -H "AUTH_USER: admin" -H "AUTH_PASS: [REDACTED]" -k -v This session allows for complete access to the web interface as an administrator. 3) Hidden "wgupload" functionality allows for file uploads as root and remote code execution -------------------------------------------------------------------------------------------- CVE-2018-10577 Reviewing the code reveals file upload functionality that is not shown to the user via the web interface. An attacker needs only a serial number (which is displayed to the user when they login to the device through the standard web interface and can be retrieved programmatically) and a valid session. An example request to demonstrate this issue is: res = send_request_cgi({ 'method' => 'POST', 'uri' => "/cgi-bin/luci/;#{stok}/wgupload", 'headers' => { 'AUTH_USER' => 'admin', 'AUTH_PASS' => '[REDACTED]', }, 'cookie' => "#{sysauth}; serial=#{serial}; filename=/www/cgi-bin/payload.luci; md5sum=fail", 'data' => "#!/usr/bin/lua os.execute('touch /code-execution'); }) An attacker can then visit the URL http://watchguard-ap200/cgi-bin/payload.luci to execute this command (or any other command). 4) Change password functionality incorrectly verifies old password ------------------------------------------------------------------ CVE-2018-10578 The change password functionality within the web interface attempts to verify the old password before setting a new one, however, this is done through AJAX. An attacker is able to simply modify the JavaScript to avoid this check or perform the POST request manually. Metasploit Module ================= ZX Security will be releasing a Metasploit module which automates exploitation of this chain of vulnerabilities. This has been delayed till 30 days after the initial patch was made available to ensure users are able to patch their devices. The module and the hard-coded password will be released on May the 14th 2018. Disclosure Timeline =================== Vendor notification: April 04, 2018 Vendor response: April 06, 2018 Firmware update released to public: April 13, 2018 Metasploit module release: May 14, 2018 References ========== [1] https://watchguardsupport.secure.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000LIy [2] https://www.watchguard.com/wgrd-blog/new-firmware-available-ap100ap102ap200ap300-security-vulnerability-fixes

Trust: 2.25

sources: NVD: CVE-2018-10576 // JVNDB: JVNDB-2018-004986 // CNVD: CNVD-2018-10148 // PACKETSTORM: 147468

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-10148

AFFECTED PRODUCTS

vendor:watchguardmodel:ap100scope:ltversion:1.2.9.15

Trust: 2.4

vendor:watchguardmodel:ap200scope:ltversion:1.2.9.15

Trust: 2.4

vendor:watchguardmodel:ap102scope:ltversion:1.2.9.15

Trust: 2.4

sources: CNVD: CNVD-2018-10148 // JVNDB: JVNDB-2018-004986 // NVD: CVE-2018-10576

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-10576
value: HIGH

Trust: 1.0

NVD: CVE-2018-10576
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-10148
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201805-026
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2018-10576
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-10148
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2018-10576
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-10148 // JVNDB: JVNDB-2018-004986 // CNNVD: CNNVD-201805-026 // NVD: CVE-2018-10576

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.8

sources: JVNDB: JVNDB-2018-004986 // NVD: CVE-2018-10576

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201805-026

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201805-026

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-004986

PATCH

title:New Firmware Available for AP100/AP102/AP200/AP300 with Security Vulnerability Fixesurl:https://www.watchguard.com/wgrd-blog/new-firmware-available-ap100ap102ap200ap300-security-vulnerability-fixes

Trust: 0.8

title:000011351url:https://watchguardsupport.secure.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000LIy

Trust: 0.8

title:Patch for WatchGuardAP100, AP102, and AP200 authentication vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/130025

Trust: 0.6

title:WatchGuard AP100 , AP102 and AP200 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79770

Trust: 0.6

sources: CNVD: CNVD-2018-10148 // JVNDB: JVNDB-2018-004986 // CNNVD: CNNVD-201805-026

EXTERNAL IDS

db:NVDid:CVE-2018-10576

Trust: 3.1

db:EXPLOIT-DBid:45409

Trust: 1.0

db:JVNDBid:JVNDB-2018-004986

Trust: 0.8

db:CNVDid:CNVD-2018-10148

Trust: 0.6

db:CNNVDid:CNNVD-201805-026

Trust: 0.6

db:PACKETSTORMid:147468

Trust: 0.1

sources: CNVD: CNVD-2018-10148 // JVNDB: JVNDB-2018-004986 // PACKETSTORM: 147468 // CNNVD: CNNVD-201805-026 // NVD: CVE-2018-10576

REFERENCES

url:https://www.watchguard.com/wgrd-blog/new-firmware-available-ap100ap102ap200ap300-security-vulnerability-fixes

Trust: 2.3

url:https://watchguardsupport.secure.force.com/publickb?type=kbsecurityissues&sfdcid=ka62a0000000liy

Trust: 1.7

url:https://www.exploit-db.com/exploits/45409/

Trust: 1.0

url:http://seclists.org/fulldisclosure/2018/may/12

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2018-10576

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10576

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-10577

Trust: 0.1

url:http://watchguard-ap200/cgi-bin/payload.luci

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10575

Trust: 0.1

url:https://watchguard-ap200/cgi-bin/luci

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10578

Trust: 0.1

sources: CNVD: CNVD-2018-10148 // JVNDB: JVNDB-2018-004986 // PACKETSTORM: 147468 // CNNVD: CNNVD-201805-026 // NVD: CVE-2018-10576

CREDITS

Stephen Shkardoon

Trust: 0.1

sources: PACKETSTORM: 147468

SOURCES

db:CNVDid:CNVD-2018-10148
db:JVNDBid:JVNDB-2018-004986
db:PACKETSTORMid:147468
db:CNNVDid:CNNVD-201805-026
db:NVDid:CVE-2018-10576

LAST UPDATE DATE

2024-11-23T21:39:05.524000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-10148date:2018-05-23T00:00:00
db:JVNDBid:JVNDB-2018-004986date:2018-07-03T00:00:00
db:CNNVDid:CNNVD-201805-026date:2018-05-02T00:00:00
db:NVDid:CVE-2018-10576date:2024-11-21T03:41:35.670

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-10148date:2018-05-23T00:00:00
db:JVNDBid:JVNDB-2018-004986date:2018-07-03T00:00:00
db:PACKETSTORMid:147468date:2018-05-03T00:01:32
db:CNNVDid:CNNVD-201805-026date:2018-05-02T00:00:00
db:NVDid:CVE-2018-10576date:2018-04-30T22:29:00.373