Design Flaw in Deutsche Telekom Speedport w700v broadband router

2007.05.17
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-Other


CVSS Base Score: 7.8/10
Impact Subscore: 6.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: None
Availability impact: None

Hi, I'd like to inform you about a vulnerability in the Deutsche Telekom Speedport w700v DSL router. Currently it's the standard device that is shipped with new DSL contracts. I - TITLE Security advisory: Weaknesses in the login process of the web interface of the Speedport w700v DSL Router and Wireless LAN Access Point II - SUMMARY Description: A design flaw exists in the login process of the web interface of the Speedport w700v DLS Router and Wireless LAN Access Point of Deutsche Telekom that might lead to unauthorized access. Author: Michael Domberg (mdomberg at gmx dot li) Date: May 11th 2007 Severity: Medium References: http://www.devtarget.org/speedport700-advisory-05-2007.txt III - OVERVIEW The Speedport w700v is an ADSL/ADSL+ broadband router, Wireless LAN Access Point, 4-Port-Switch and telephone system with integrated firewall and advanced security features. More information about the product can be found online at http://www.t-com.de IV - DETAILS The Speedport firmware consists of some CGI-Scripts that interact with the hardware and some static html-pages as front-end. The login to the web interface is designed the same way. Upon submitting the system password (no username required...) the password is sent to a cgi-script that verifies the password with internal sources. If the verification is successful, the welcome screen of the interface is returned. If the verification failed the login screen is returned. To avoid brute force attacks, the login page contains some JavaScript that disables the input field for a certain amount of seconds. The first attempt is one second delayed, the second is two second delayed and any further attempt is delayed for the doubled amount of time of the previous one. So the 8th attempt requires the attacker to wait for about 4 minutes. By submitting the request directly to the underlying cgi-script and verifying the result page an attacker can circumvent this mechanism and perform multi-threaded brute-force attacks. V - ANALYSIS The severity of this vulnerability is to be considered "medium". The default password of the web interface is "0000". So users often choose a four-digit numeric password, too. The Speedport 700 series is one of the most-sold DSL modems, because it is the standard hardware for german DSL users of Deutsche Telekom. Users can prevent their modems from being exploited this way by disabling remote administration access (which is the default). VI - EXPLOIT CODE An PoC is available, but not published. VII - WORKAROUND/FIX Users have to disable remote administration access to prevent their routers from being exploited. The vendor doesn't seem to address this vulnerability. VIII - DISCLOSURE TIMELINE 22. February 2007 - Notified vendor of affected software 28. February 2007 - Vulnerability confirmed 11. May 2007 - Public disclosure Regards, Michael Domberg, www.devtarget.org


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top