exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

unpassworded.dsl.routers.txt

unpassworded.dsl.routers.txt
Posted Mar 11, 2000
Authored by Andrew R. Siverly

In the deployment of the Cayman-DSL router and many others, technitions are failing to reset the default password which in many cases default to no password at all. A malicious user could scan for such devices and on a DSL providers network. Worst case scenerio, the static routing tables can be altered to permit remote sniffing.

tags | exploit, remote
SHA-256 | d832de63ac31ac9655f2f4b29833981f513ac46b8147d8182cb019544f660fb0

unpassworded.dsl.routers.txt

Change Mirror Download
 Kewlhair Security Advisory
Advisory Name: Router Passwords
Advisory Released: 03/09/00
Severity: Moderate
Summary: An attacker can seize control of an SBC customer=92s router.


Overview:
SBC is currently deploying the Cayman-DSL router to its DSL
customer=92s.(SBC communications being the parent company for
Southwestern Bell, Ameritech, Pacific Bell, Nevada Bell, Cellular
One, and a few more.) With this deployment SBC is neglecting to set
passwords on the router. Kewlhair has found over 300 of these
non-pass worded routers.

Description:

Telco engineers often fail to set passwords on DSL modems installed
at
Customer sites. The vulnerability affects many different DSL modems.
The Cayman product is especially vulnerable because it defaults to
having no Password at all.

As the Telco=92s does often not educate the customers, their modems are
left vulnerable to intrusion and denial of service events.

Vulnerability:

An individual with malicious intent could easy scan for these devices
on a DSL providers network, connect to them, and disable them without
significant effort. In addition, an intruder could disable access to
the device itself by installing a password (which only they would
know).

A significant vulnerability is that these devices often can be set
with
Static routing tables so packets could be sent through an environment
where a malicious third party could monitor the traffic.

The Demo:

[ user@xxxx /user]# telnet xxx.xxx.xxx..xxx..
Trying xxx.xxx.xxx.xxx...
Connected to xxx.xxx.xxx.xxx.
Escape character is '^]'.

Terminal shell v1.0
Cayman-DSL Model 3220-H, DMT-ADSL (Alcatel) plus 4-port hub
Running GatorSurf version 5.3.0 (build R2)
( completed login: administrator level)

Cayman-DSLXXXXXX>



Worse Case:
Someone writes a script that logs into every one of these routers
sets the passwords, then changes the ip or kills the interface so it
no longer works properly. Then causing and SBC engineer to come to
the home or place of business to fix this problem.
(I bet that would cost some bucks)

Solutions:

Mandate that the Telco engineers change the default passwords on the
devices at time of install, and provide literature to the consumer
advising them of the risks of DSL (or cable) connections to the
Internet.

Quick solution:
Set your password on your Cayman router.
http://cayman.com/security.html#passwordprotect

How do I password protect the Cayman router?

Through the browser:
1. Browse into the Cayman router.
2. Click on the " Expert Mode" link.

Through a Telnet session:
1. First establish a telnet session to the unit or connect serially
to the console port at 9600 Baud.
2. At the prompt, type " configure" ( NOTE-all commands are typed
without quotes) and enter.
3. At this point you will be at the " top" prompt. Then type "
system" and enter.
4. Now you will be at the " system" prompt. Here you type," set
password" admin and enter.
5. You will then be prompted for the new password and then be
prompted to repeat the password. Once you have done this, you will be
back at the system prompt.
6. Here you will need to repeat the process, this time for the user
password, by doing the following steps:
7. Type, " set password user" and enter. Again you will then be
prompted for the
new password an then be prompted to repeat the password. Once this
is done, you will be at the " system" prompt again.
Here type," quit" , and you will be prompted, " Save modified
configuration data [y|n] ?" Type, " yes" and the router is now
password protected.

NOTE- We recommend that the admin and user password be the same to
avoid confusion. This approach allows only the admin password to view
or change the settings.


asiverly@kewlhair.com

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close