<<< Date Index >>>     <<< Thread Index >>>

Re: SNMP community string disclosure in Linksys WAP55AG



Simply requiring a valid read-only community string to obtain a read-write
string is not sufficient enough protection.

It is possible to expose a read-only community string through a packet
broadcast on an unpopulated arp table on a switch, thus expose the entire unit
to attack. The owner may not even wish to update any data via SNMP, but simply
walking the table with a read-only string will allow any attacker to do so.

Can anyone confirm if the strings are writable via the read-write community
string? If an attacker was able to change the configuration and then lock-out
the remote administration capabilities it would create quite a nuisance,
especially if the access point is in a remote location.

Robbie


> On Wed, 17 Feb 2004, NN Poster wrote:
> 
> > Linksys WAP55AG does not properly secure SNMP community strings. In
particular, it is possible to obtain all community strings, including
read/write, by querying OID 1.3.6.1.4.1.3955.2.1.13.1.2.
> >
> > 1.3.6.1.4.1.3955.2.1.13.1.2.1 = STRING: "public"
> > 1.3.6.1.4.1.3955.2.1.13.1.2.2 = STRING: "private"
> >
> > Verified on WAP55AG, firmware 1.07
> 
> But ... Can you obtain this information without a valid community string?
> 
> Hugo.
> 
> -- 
>  All email sent to me is bound to the rules described on my homepage.
>     hvdkooij@xxxxxxxxxxxxxxx          http://hvdkooij.xs4all.nl/
>           Don't meddle in the affairs of sysadmins,
>           for they are subtle and quick to anger.
> 



--