SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   NETGEAR Router Vendors:   NETGEAR
NETGEAR WAB102 Wireless Access Point Lets Remote Users Login Without Authenticating
SecurityTracker Alert ID:  1008445
SecurityTracker URL:  http://securitytracker.com/id/1008445
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 11 2003
Impact:   User access via network
Exploit Included:  Yes  
Version(s): WAB102; firmware version 1.2.3
Description:   An authentication vulnerability was reported in the NETGEAR WAB102 wireless access point. A remote user can login to the device without knowing the password. Also, a power failure resets the device to a known password.

It is reported that a remote user can supply an arbitrary password containing a space character to gain access to the device.

It is also reported that a power outage will reset the device to the default password of '1234', in which case the 'space' character exploit reportedly does not work.

The vendor has reportedly been notified.

Impact:   A remote user can login to the device without having to know the password.

If the device experiences a power outage, the device will reset its password to a known value.

Solution:   No solution was available at the time of this entry.
Vendor URL:  www.netgear.com/ (Links to External Site)
Cause:   Authentication error, Configuration error

Message History:   None.


 Source Message Contents

Subject:  NetGear WAB102


The NetGear WAB102 (running firmware v1.2.3) is a dual band wireless access
point. After a recent power outage I noticed that the unit reset its
password to the default of '1234'. Obviously this makes it possible for
someone to reconfigured it meet their needs... a significant security risk.
After further testing I discovered that any password with a space in it will
be accepted and will work as long as the unit is not powered off or reset.
Once reset it reverts to the default password.  All other settings remain
intact, WEP keys, IP addresses, etc. I found it particularly interesting
that you don't even have to login to the unit to get a list of wireless
stations accessing the unit ... makes it real easy to gather MAC addresses
to spoof.

NetGear notified a few days ago, they suggested I update the firmware to the
latest... it was already running it but I did it again for good measure...
no change. Other units may be affected.

Jon Kamm
NetKamm LLC

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC