what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Watchguard Hard-Coded Credentials / Failed Controls

Watchguard Hard-Coded Credentials / Failed Controls
Posted May 3, 2018
Authored by Stephen Shkardoon

WatchGuard Access Points running firmware before version 1.2.9.15 suffer from hard-coded credential, hidden authentication, file upload, and incorrect validation vulnerabilities.

tags | exploit, vulnerability, file upload
advisories | CVE-2018-10575, CVE-2018-10576, CVE-2018-10577, CVE-2018-10578
SHA-256 | 074ffab29ea1105f73419b2ca122629ebcae92a0b78ff2d60a0d32d88e59704b

Watchguard Hard-Coded Credentials / Failed Controls

Change Mirror Download
Introduction
============

Multiple vulnerabilities can be chained together in a number of
WatchGuard AP products which result in pre-authenticated remote code
execution.

The vendor has produced a knowledge-base article[1] and
announcement[2] regarding these issues.

ZX Security would like to commend the prompt response and resolution
of these reported issues by the vendor.

Product
=======

Several WatchGuard Access Points running firmware before v1.2.9.15 are
affected, including:
* AP100
* AP102
* AP200

The AP300 is also affected by issues 2, 3 and 4 when running firmware
before 2.0.0.10.

The latest firmware update resolves these issues.

Technical Details
=================

1) Hard-coded credentials
-------------------------
CVE-2018-10575

A hard-coded user exists in /etc/passwd. The vendor has requested the
specific password and hash be withheld until users can apply the
patch.
There is no way for a user of the access point to change this
password. An attacker who is aware of this password is able to access
the device over SSH and pivot network requests through the device,
though they may not run commands as the shell is set to /bin/false.

2) Hidden authentication method in web interface allows for
authentication bypass
---------------------------------------------------------------------------------
CVE-2018-10576

The standard authentication method for accessing the webserver
involves submitting an HTML form. This uses a username and password
separate from the standard Linux based /etc/passwd authentication.
An alternative authentication method was identified from reviewing the
source code whereby setting the HTTP headers AUTH_USER and AUTH_PASS,
credentials are instead tested against the standard Linux /etc/passwd
file. This allows an attacker to use the hardcoded credentials found
previously (see 1. Hard-coded credentials) to gain web access to the
device.
An example command that demonstrates this issue is:
curl https://watchguard-ap200/cgi-bin/luci -H "AUTH_USER:
admin" -H "AUTH_PASS: [REDACTED]" -k -v

This session allows for complete access to the web interface as an
administrator.

3) Hidden "wgupload" functionality allows for file uploads as root and
remote code execution
--------------------------------------------------------------------------------------------
CVE-2018-10577

Reviewing the code reveals file upload functionality that is not shown
to the user via the web interface. An attacker needs only a serial
number (which is displayed to the user when they login to the device
through the standard web interface and can be retrieved
programmatically) and a valid session.
An example request to demonstrate this issue is:
res = send_request_cgi({
'method' => 'POST',
'uri' => "/cgi-bin/luci/;#{stok}/wgupload",
'headers' => {
'AUTH_USER' => 'admin',
'AUTH_PASS' => '[REDACTED]',
},
'cookie' => "#{sysauth}; serial=#{serial};
filename=/www/cgi-bin/payload.luci; md5sum=fail",
'data' => "#!/usr/bin/lua
os.execute('touch /code-execution');
})

An attacker can then visit the URL
http://watchguard-ap200/cgi-bin/payload.luci to execute this command
(or any other command).

4) Change password functionality incorrectly verifies old password
------------------------------------------------------------------
CVE-2018-10578

The change password functionality within the web interface attempts to
verify the old password before setting a new one, however, this is
done through AJAX. An attacker is able to simply modify the JavaScript
to avoid this check or perform the POST request manually.

Metasploit Module
=================

ZX Security will be releasing a Metasploit module which automates
exploitation of this chain of vulnerabilities. This has been delayed
till 30 days after the initial patch was made available to ensure
users are able to patch their devices.
The module and the hard-coded password will be released on May the 14th 2018.

Disclosure Timeline
===================

Vendor notification: April 04, 2018
Vendor response: April 06, 2018
Firmware update released to public: April 13, 2018
Metasploit module release: May 14, 2018

References
==========

[1] https://watchguardsupport.secure.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000LIy
[2] https://www.watchguard.com/wgrd-blog/new-firmware-available-ap100ap102ap200ap300-security-vulnerability-fixes


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close