Executive Summary

Summary
Title Netgear GS105PE Prosafe Plus Switch contains hard-coded login credentials
Informations
Name VU#143740 First vendor Publication 2014-07-03
Vendor VU-CERT Last vendor Modification 2014-07-08
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:A/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 8.3 Attack Range Adjacent network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 6.5 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#143740

Netgear GS105PE Prosafe Plus Switch contains hard-coded login credentials

Original Release date: 03 Jul 2014 | Last revised: 08 Jul 2014

Overview

Netgear GS105PE Prosafe Plus Switch firmware version 1.2.0.5 contains hard-coded credentials. (CWE-798)

Description

Netgear GS105PE Prosafe Plus Switch contains hard-coded login credentials that can be used for authenticating to the web server running on the device. The username is ntgruser and the password is debugpassword. Once authenticated, the web server provides access to:

produce_burn.cgi : Modify the serial number and MAC address of the product
register_debug.cgi : Allow the user to manually set memory to a certain value and extract that value from it
bootcode_update.cgi : Allow the user to upload new firmware.

Note: The previous version of this note incorrectly identified the Netgear GS108PE as the affected model.

Impact

A remote unauthenticated attacker may be able to login into the device and execute arbitrary code.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Netgear, Inc.Unknown19 May 201419 May 2014
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base7.8AV:A/AC:L/Au:N/C:C/I:C/A:N
Temporal6.3E:POC/RL:U/RC:UC
Environmental1.7CDP:L/TD:L/CR:ND/IR:ND/AR:ND

References

  • http://www.netgear.com/business/products/switches/unmanaged-plus/GS105PE.aspx

Credit

Thanks to Marc Olivier Chouinard for reporting this vulnerability.

This document was written by Chris King.

Other Information

  • CVE IDs:CVE-2014-2969
  • Date Public:03 Jul 2014
  • Date First Published:03 Jul 2014
  • Date Last Updated:08 Jul 2014
  • Document Revision:12

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/143740

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-255 Credentials Management

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 1
Os 1

Nessus® Vulnerability Scanner

Date Description
2014-07-11 Name : The remote service has well known hard-coded credentials.
File : netgear_GS105PE_hardcodedpass.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2014-07-25 13:18:49
  • Multiple Updates
2014-07-12 13:28:08
  • Multiple Updates
2014-07-08 17:21:14
  • Multiple Updates
2014-07-08 00:25:07
  • Multiple Updates
2014-07-07 17:26:07
  • Multiple Updates
2014-07-03 21:22:32
  • First insertion