Bugtraq mailing list archives

Re: Linksys 'routers', SNMP issues


From: Ken.Williams () ey com
Date: Wed, 9 Jan 2002 10:22:44 -0600

Note that the BEFSR41 (and most likely numerous other Linksys
models too) are/were also vulnerable to the issues described
below - depends on what ver of firmware you have.  To my
knowledge, the latest firmware upgrades fix most models.

I have confirmed through the vendor that the BEFSR41 and BEFSR81
were vulnerable to the issues below, and that the latest firmware
upgrades for each model correct all of the issues.
Latest firmware:
BEFSR41 - v1.40.2
BEFSR81 - v2.40.2

(These issues were actually addressed several revs back early last
year)

Contact support () linksys com to see if your model is vulnerable and
if the latest firmware corrects the issues.  I have found Linksys
Support to be very helpful and responsive.

If you are using a Linksys Cable/DSL router, then you should be
using Linklogger <www.linklogger.com> so you can adequately monitor
and log suspicious events.  Great software, highly recommended.

Regards,
ken

Ken Williams ; Technical Lead ; ken.williams () ey com
eSecurityOnline - an eSecurity Venture of Ernst & Young
ken.williams () ey com ; www.esecurityonline.com ; 1-877-eSecurity




                    "Matthew S.
                    Hallacy"              To:     bugtraq () securityfocus com
                    <poptix@techmo        cc:
                    nkeys.org>            Subject:     Linksys 'routers',
SNMP issues

                    01/06/2002
                    06:55 AM






Howdy.

LinkSys DSL 'routers' have some serious information leakage, and potention
DDoS
usage. The following models have been confirmed as having this problem:
BEFN2PS4 (EtherFast Cable/DSL Router & Voice with 4-Port Switch)
BEFSR81 (EtherFast Cable/DSL Router with 8-Port Switch)

Querying these devices with the default community of 'public' causes them
to set
the address that queried as their snmptrap host, dumping traffic such as
the
following to that address:

Enterprise Specific Trap (1) Uptime: 2 days, 19:00:23.36,
enterprises.3955.1.1.0 = "@out 192.168.1.200 ==> 24.254.60.13[110]."
Enterprise Specific Trap (1) Uptime: 2 days, 19:00:23.36,
enterprises.3955.1.1.0 = "@out 192.168.1.200 ==> 216.120.8.23[5632]."
Enterprise Specific Trap (1) Uptime: 2 days, 19:00:23.36,
enterprises.3955.1.1.0 = "@out 192.168.1.200 ==> 216.120.8.3[5632]."
Enterprise Specific Trap (1) Uptime: 2 days, 19:00:23.36,
enterprises.3955.1.1.0 = "@out 192.168.1.200 ==> 216.120.8.4[5632]."
Enterprise Specific Trap (1) Uptime: 2 days, 19:00:23.36,
enterprises.3955.1.1.0 = "@out 192.168.1.200 ==> 216.120.8.5[5632]."
Enterprise Specific Trap (1) Uptime: 2 days, 6:04:38.11,
enterprises.3955.1.1.0 = "-->[U]Send OP:    ^ps_status_q
15049C0DFC9B03166D55EA30474D04FB 9218583272 a .."
Enterprise Specific Trap (1) Uptime: 2 days, 6:04:38.11,
enterprises.3955.1.1.0 = "<--[U]Recv __:
^ps_status_r.15049C0DFC9B03166D55EA30474D04FB.\"\".0.."

It looks like a combination of debugging information as well as traffic
logging,
many customers never use the configuration page, let alone change the SNMP
communities. To make the matter worse, LinkSys refuses to distribute an MIB
for the device, which is not suprising considering the SNMP implementation
on the device is rather broken (it goes into a continious loop).


LinkSys is routing all messages regarding SNMP to /dev/null

                               Have a nice day.
                               Matthew S. Hallacy
--






______________________________________________________________________
The information contained in this message may be privileged and
confidential and protected from disclosure.  If the reader of this message
is not the intended recipient, or an employee or agent responsible for
delivering this message to the intended recipient, you are hereby notified
that any dissemination, distribution or copying of this communication is
strictly prohibited. If you have received this communication in error,
please notify us immediately by replying to the message and deleting it
from your computer.  Thank you.  Ernst & Young LLP


Current thread: