Siemens SpeedStream Wireless Router UPnP Support Lets Remote Users Access Restricted Files
SecurityTracker Alert ID: 1016412|
SecurityTracker URL: http://securitytracker.com/id/1016412
(Links to External Site)
Updated: Aug 12 2008|
Original Entry Date: Jun 29 2006
User access via network|
Exploit Included: Yes |
Version(s): Tested on Model 2624|
A vulnerability was reported in the SpeedStream wireless router. A remote user can access restricted files.|
A remote user can access protected files without having to login to the system by using the UPnP support interface.
The vendor was notified on May 2, 2006, without response.
Jaime Blasco discovered this vulnerability.
The original advisory is available at:
A remote user can access ostensibly protected files on the target device.|
No solution was available at the time of this entry.|
Vendor URL: www.siemens.com/ (Links to External Site)
Access control error|
Source Message Contents
Date: Thu, 29 Jun 2006 10:13:04 +0000|
Subject: Digital Armaments Security Advisory 29.06.2006: Siemens Speedstream
Digital Armaments advisory is 05.02.2006
The SpeedStream Wireless DSL/Cable Router is usually adopted for home and small business solutions. Together with an existing DSL
or cable modem connection, this affordable, easy to use connection sharing solution brings the freedom of high-speed, wireless broadband
connectivity to home and SOHO networks. Its comprehensive functionality provides vital firewall protection, IP sharing capabilities,
and fundamental routing features that support popular protocols like NetMeeting and VPN.
For further information or detail about the software you can refer to the vendor's homepage:
II. Problem Description
Speedstream routers have UPnP/1.0 support. An attacker can access protected files and bypass the password protection without login
using the UPnP part of the tree.
This problem has been detected on latest version of Siemens Speedstrem Router. It has been tested on the Speedstream 2624.
IV. Impact analysis
Successful exploitation allow an attacker to bypass the password protection. It also allow an attacker to access protected files without
First notification 05.02.2006.
Second notification 05.20.2006.
No answer from the vendor.
Jaime Blasco - firstname.lastname@example.org is credited with this discovery.
Get paid and get stocks by vulnerability submission
VII. Legal Notices
Copyright © 2006 Digital Armaments LLC.
Redistribution of this alert electronically is allowed. It should not be edited in any way. Reprint the whole is allowed, partial
reprint is not permitted. For any other request please email email@example.com for permission.
Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information.
Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information.
Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from
use of, or reliance on, this information.