Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Router/Bridge/Hub)  >   SpeedStream Vendors:   Siemens
Siemens SpeedStream Wireless Router UPnP Support Lets Remote Users Access Restricted Files
SecurityTracker Alert ID:  1016412
SecurityTracker URL:
CVE Reference:   CVE-2006-3344   (Links to External Site)
Updated:  Aug 12 2008
Original Entry Date:  Jun 29 2006
Impact:   User access via network
Exploit Included:  Yes  
Version(s): Tested on Model 2624
Description:   A vulnerability was reported in the SpeedStream wireless router. A remote user can access restricted files.

A remote user can access protected files without having to login to the system by using the UPnP support interface.

The vendor was notified on May 2, 2006, without response.

Jaime Blasco discovered this vulnerability.

The original advisory is available at:

Impact:   A remote user can access ostensibly protected files on the target device.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

Subject:  Digital Armaments Security Advisory 29.06.2006: Siemens Speedstream

Digital Armaments advisory is 05.02.2006

I. Background

The SpeedStream Wireless DSL/Cable Router is usually adopted for home and small business solutions. Together with an existing DSL
 or cable modem connection, this affordable, easy to use connection sharing solution brings the freedom of high-speed, wireless broadband
 connectivity to home and SOHO networks. Its comprehensive functionality provides vital firewall protection, IP sharing capabilities,
 and fundamental routing features that support popular protocols like NetMeeting and VPN.

For further information or detail about the software you can refer to the vendor's homepage:

II. Problem Description

Speedstream routers have UPnP/1.0 support. An attacker can access protected files and bypass the password protection without login
 using the UPnP part of the tree.

III. Detection

This problem has been detected on latest version of Siemens Speedstrem Router. It has been tested on the Speedstream 2624.

IV. Impact analysis

Successful exploitation allow an attacker to bypass the password protection. It also allow an attacker to access protected files without

V. Solution

First notification 05.02.2006.

Second notification 05.20.2006.

No answer from the vendor.

VI. Credit

Jaime Blasco - is credited with this discovery.

Get paid and get stocks by vulnerability submission

VII. Legal Notices

Redistribution of this alert electronically is allowed. It should not be edited in any way. Reprint the whole is allowed, partial
 reprint is not permitted. For any other request please email for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information.
 Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information.
 Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from
 use of, or reliance on, this information. 


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC