Summary
The remote Netmaster Wireless Cable Modem is prone to a security-bypass vulnerability.
Impact
Attackers can exploit this issue to bypass the authentication mechanism and gain access to the vulnerable device.
Solution
Ask the Vendor for an update, disable SNMP or change the default SNMP community.
Insight
By default this device is exposing critical information by requesting '1.3.6.1.4.1.4491.2.4.1.1.6.1.2.0' via SNMP using 'public' as community string.
This could be tested by running:
snmpget -v1 -c public <target> 1.3.6.1.4.1.4491.2.4.1.1.6.1.2.0
The following data is also exposed:
Username: 1.3.6.1.4.1.4491.2.4.1.1.6.1.1.0
ssid: 1.3.6.1.4.1.4413.2.2.2.1.5.4.1.14.1.3.32 WPA PSK: 1.3.6.1.4.1.4413.2.2.2.1.5.4.2.4.1.2.32 Wep 64-bit: 1.3.6.1.4.1.4413.2.2.2.1.5.4.2.2.1.2.32.1-4 WEP 128-bit: 1.3.6.1.4.1.4413.2.2.2.1.5.4.2.3.1.2.32.1-4
Affected
Netmaster Wireless Cable Modem
Detection
Try to retrieve the password via snmp.
Severity
Classification
-
CVE CVE-2014-4862 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities