SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   ProxyServer (Multi-Tech) Vendors:   Multi-Tech Systems
Multi-Tech ProxyServer Default Configuration Gives Remote Users Control of the System
SecurityTracker Alert ID:  1005792
SecurityTracker URL:  http://securitytracker.com/id/1005792
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 12 2002
Impact:   Root access via network
Exploit Included:  Yes  
Version(s): Model MTPSR1-120, Version 3.0
Description:   A configuration vulnerability was reported in the Multi-Tech MTPSR1-120 ProxyServer. The default configuration gives unrestricted access to the telnet management port.

UkR security team reported that the Proxy's configuration software default configuration does not set a password on the firewall proxy. A remote user can access the telnet port and change the device's configuration.

Impact:   A remote user can gain full control of the device (under the default configuration).
Solution:   No vendor solution was available at the time of this entry. The author of the report recommends that you set a password during the initial configuration and disable the telnet port.
Vendor URL:  www.multitech.com/ (Links to External Site)
Cause:   Configuration error

Message History:   None.


 Source Message Contents

Subject:  MTPSR1-120 Firewall Proxy configuration software


Product     :  MTPSR1-120 Firewall Proxy configuration 
software
Version	    :  3.0
Vendor      :  Multi-Tech Systems, Inc. 
(http://www.multitech.com)
Remote      :  Yes
Author      :  UkR-XblP (cuctema@ok.ru)/ UkR security team 

Overview:
Firewall Proxy configuration software default do not set a 
Firewall password and allow access via telnet protocol. As 
a result, the telnet port will be left exposed to 
unrestricted remote access. Remote users 
with malicious intent will be able to access the Firewall 
to change varius configs, such as IP, PPP/SLIP, WAN, 
Proxy, DHCP, Virtual Server or reset Firewall. Attackers 
can set their password, block webserver and registered 
users don't can login for change changes remote.

Solution:
Set the  password after setup and desirable to disable 
telnet access.
---
Professional hosting for everyone - http://www.host.ru

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC