Bugtraq mailing list archives

Re: aDSL routers


From: cshenton () UUCOM COM (Chris Shenton)
Date: Wed, 14 Apr 1999 18:55:29 -0400


On Tue, 13 Apr 1999 23:01:50 -0700, David Brumley <dbrumley () GOJU STANFORD EDU> said:

David> And at least one manufacturer, flowpoint, sets no admin
David> password.  It's in the documentation, so I assume the company
David> already knows about this vulnerability:) System managers who
David> have aDSL access often overlook this, so I thought I'd point it
David> out.  A quick fix: disable telnet access to all of your aDSL
David> router IP's.  Better fix: set an admin password.

I have a couple other concerns on my 2200 (firmware 3.0.2).

My carrier, Covad, did set a password but it's too easy. You can
restrict IP access to telnet like:

        system addTelnetFilter first.host.ip.addr [last.host.ip.addr]

You should also do this for SNMP since it's available to the world
with community "public":

        system addSNMPFilter first.host.ip.addr [last.host.ip.addr]

I restrict these to my LAN.

Have you tried an nmap scan on it?  It reports "trivial joke" for TCP
sequence predictability.  Should allow bad guys to hijack sessions.
Doubleplusungood. I've gotten no feedback from comp.dcom.xdsl or
support () flowpoint com.

If anyone has clues to protect this I'd like to hear 'em but I fear
it'll require new code and firmware from Flowpoint and they're not
being responsive.



Current thread: