[LWN Logo]
[LWN.net]
Date: Tue, 10 Apr 2001 19:43:58 -0400 (EDT)
From: CERT Advisory <cert-advisory@cert.org>
To: cert-advisory@cert.org
Subject: CERT Advisory CA-2001-08


-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2001-08 Multiple Vulnerabilities in Alcatel ADSL Modems

   Original release date: April 10, 2001
   Last revised: --
   Source: CERT/CC

   A complete revision history can be found at the end of this file.

Systems Affected

     * Alcatel Speed Touch Home ADSL Modem
     * Alcatel 1000 ADSL Network Termination Device

Overview

   The San Diego Supercomputer Center (SDSC) has recently discovered
   several vulnerabilities in the Alcatel Speed Touch Asymmetric Digital
   Subscriber Line (ADSL) modem. These vulnerabilities are the result of
   weak authentication and access control policies and exploiting them
   will lead to one or more of the following: unauthorized access,
   unauthorized monitoring, information leakage, denial of service, and
   permanent disability of affected devices.

   The SDSC has published additional information regarding these
   vulnerabilities at

          http://security.sdsc.edu/self-help/alcatel/

I. Description

   VU#211736 - Alcatel ADSL modems grant unauthenticated TFTP access via
   Bounce Attacks

   Alcatel ADSL modems allow unauthenticated Trivial File Transfer
   Protocol (TFTP) access from the local area network (LAN) as a method
   to update firmware and to make configuration changes to the device. In
   conjunction with one of several common vulnerabilities, a remote
   attacker may be able to gain unauthenticated access as well.

   For example, if a system on the LAN side of the ADSL modem has the UDP
   echo service enabled, a remote attacker may be able to spoof packets
   such that the ADSL modem will believe that this traffic originated
   from the local network. By sending a packet to the UDP echo service
   with a spoofed source port of 69 (TFTP) and a source address of
   255.255.255.255, the system providing the echo service can be tricked
   into sending a TFTP packet to the ADSL modem. If a system offering
   this service is accessible from the Internet it may be possible to use
   the system to attack the ADSL modem.

   Any mechanism for "bouncing" UDP packets off systems on the LAN side
   of the network may potentially allow a remote attacker to gain TFTP
   access to the device. Gaining TFTP access to the device allows the
   remote attacker to essentially gain complete control of the device. 

   VU#243592 - Alcatel ADSL modems provide EXPERT administrative account
   with an easily reversible encrypted password

   Alcatel ADSL modems contain a special account (EXPERT) for gaining
   privileged access to the device. This account is secured via a
   challenge-response password authentication mechanism. While the use of
   such a mechanism is commendable, the algorithm used is not
   sufficiently strong. Attackers who know the algorithm used to compute
   the response can compute the correct response using information given
   to them during the login process.

   Because the EXPERT account is accessible via TELNET, HTTP, and FTP,
   the ADSL modem must have an IP address that is accessible from the
   Internet to exploit this vulnerability. Alcatel ADSL products do not
   enable this feature over the wide area network (WAN) interface by
   default. Note however, that an attacker with TFTP access may be able
   to reconfigure the device to enable this feature.

   This authentication mechanism is present even if the user has set a
   user supplied password.

   Any problem or vulnerability on your internal network that allows an
   intruder to communicate with the modem may lead to its compromise,
   including Trojan horses, compromised systems, or other "bounce"
   vulnerabilities like the FTP bounce vulnerability described in

          http://www.cert.org/tech_tips/ftp_port_attacks.html

   VU#212088 - Alcatel ADSL modems contain a null default password

   The Alcatel Speed Touch ADSL modem ships with a null default password,
   permitting unauthenticated access via TELNET, HTTP, and FTP. As with
   the EXPERT account vulnerability, the device must have an externally
   accessible IP address. 

   VU#490344 - Alcatel ADSL modems provide unauthenticated TFTP access
   via physical access to the WAN interface

   To allow your ISP to upgrade the firmware of the ADSL modem remotely,
   unauthenticated TFTP access is provided to users with physical access
   to the wire on the WAN side of the modem. While this access is
   normally used by your ISP, it could also be abused by an attacker with
   physical access to the wire outside of your home.

II. Impact

   VU#211736 - Alcatel ADSL modems grant unauthenticated TFTP access via
   Bounce Attacks

   A remote attacker may be able to gain access to perform TFTP
   operations. These operations include

     * inspection of configuration data
     * recovery and setting of passwords
     * inspection and updates to the firmware
     * destructive updates to the firmware
     * malicious custom updates to the firmware

   Note that the Alcatel ADSL modems do not provide any mechanism for
   determining the validity of firmware updates, so a remote attacker may
   be able to install custom firmware that operated as a distributed
   denial of service client or a network sniffer. Similarly, an attacker
   could produce an invalid firmware revision that would disable the
   device completely, leaving victims no alternative but to return the
   disabled unit to the manufacturer. 

   VU#243592 - Alcatel ADSL modems provide EXPERT administrative account
   with an easily reversible encrypted password

   Attackers who are able to connect to the ADSL modem can enter a
   predictable user ID and password to gain privileged access to the
   device. This access can be used to reconfigure the device, potentially
   introducing additional security weaknesses. 

   VU#212088 - Alcatel ADSL modems contain a null default password

   Unless the user or Internet service provider changes the default
   password of an affected device, a remote attacker can access the modem
   via TELNET, HTTP, or FTP. In the case of TELNET and HTTP, this
   vulnerability grants the attacker read and write access to device
   configuration. For FTP, this vulnerability allows the attacker to
   browse the file structure of the affected device. 

   VU#490344 - Alcatel ADSL modems provide unauthenticated TFTP access
   via physical access to the WAN interface

   An attacker with physical access to your wire may be able to gain
   unauthenticated TFTP access to the device with the same impacts as
   described in the "bounce" vulnerability (VU#211736).

III. Solution

Set a password for your ADSL modem

          Because the Alcatel ADSL modems ship without a password by
          default, an attacker may be able to gain access if this
          password has not been set. Users are encouraged to set a
          password when the device is first configured. This solution
          does not protect you from all of the vulnerabilities described
          above. In particular, a user supplied password does not prevent
          the use of the EXPERT account.

Block malicious traffic at your network perimeter

          If you have a home firewall product you may be able to prevent
          the TFTP UDP bounce attack by filtering one or more of the
          following types of traffic:

          + packets with spoofed source addresses
          + packets with a source address of 255.255.255.255
          + packets with a destination port of echo (or other "simple"
            services)

          Note that intruders who are able to gain access to your local
          area network may be able to gain unauthenticated TFTP access
          using mechanisms other than the TFTP UDP bounce method.

Appendix A. - Vendor Information

   This appendix contains information provided by vendors for this
   advisory. When vendors report new information to the CERT/CC, we
   update this section and note the changes in our revision history. If a
   particular vendor is not listed below, we have not received their
   comments.

Alcatel

          ALCATEL SPEED TOUCH ADSL MODEM SECURITY INFORMATION
          About security of Modems and Networks

          Security issues can be divided into two main areas: network
          security and user security, more particularly user's content
          security.

          Wide Area Network (WAN) security is about protecting a network
          from malicious usage. Security can be guaranteed at all network
          levels except at Customer Premise Equipment (CPE), since such
          equipment is not directly controlled by an Operator or an ISP.

          This is true for any type of CPE, such as telephones, analogue,
          DSL or cable modems and fax machines. Security can only be
          guaranteed at the network level for an Operator's, ISP's or
          private network. This means that a network should stay
          operational at all times. Alcatel has built this type of
          security in its DSLAM (operated by the service provider).

          User security is about protecting the content and local area
          network of an end-user. This type of security has to be
          implemented on Local Area Network (LAN) or PC level at customer
          premises.

          This is standard practice for any network connection (leased
          lines, cable modem, DSL). Such modems provide connectivity not
          security. Security of content for the user can be reinforced at
          the LAN level by installing a dedicated firewall HW/SW, either
          on the server or on the PC or by installing a dedicated
          firewall device, although Alcatel provides also DSL modems
          which have firewall security Statement. Private and LAN
          security is in the responsibility of the user.

          There are many soft and hardware products on the market to
          ensure security, including those from Alcatel.

          Modem security

          Firstly, people have been able to alter firmware on the modem.
          This is a standard feature foreseen in some of the Speed Touch
          modems to allow SW upgrades locally or remotely. Access from
          the LAN interface into the modem is not a security problem,
          since the modem belongs to the person who is using it. However,
          via a protection mechanism a feature is foreseen so that nobody
          can do that remotely (or via the WAN/DSL interface). This
          protection mechanism guarantees that nobody from outside can
          access the modem and make changes.

          This protection can be switched off locally by the modem owner,
          in case the service provider wants to do upgrades. This process
          is normally managed by the service provider, and the service
          provider explains to the end-user how to disactivate the
          protection and re-activate again. To avoid security problems,
          this feature is not explained in the user manual.

          Alcatel ships all modems with the protection activated,
          however, it's easy for a modem owner to disactivate the
          protection, since this is documented on the Alcatel website.
          However, if a user disactivates this, he's also responsible for
          activating it again.

          Secondly, the method of getting into the modem is more advanced
          and it is a standard practice used by hackers. The way it works
          is that they fake local communication via the WAN interface by
          using an ECHO port on a UNIX server connected to LAN network.
          The modem assumes communication comes from the modem owner and
          is secure. However, this is an old security problem in all data
          communication networks and is solved by means of a firewall.

          Firewall's are standard practice for each well managed
          communication network. Recommendation that Alcatel gives is to
          install a dedicated firewall or firewall software, or make use
          of the Alcatel Speed Touch modem with Firewall capabilities.

          (See URL: http://www.alcatel.com/consumer/dsl/prodprofw.htm)
     _________________________________________________________________

   The CERT Coordination Center would like to thank Tom Perrine and
   Tsutomu Shimomura of the San Diego Supercomputer Center for notifying
   us about this problem and their help in constructing this advisory.
     _________________________________________________________________

   Authors: This document is based on research by the SDSC and was
   written by Cory Cohen, Jeffrey P. Lanza, and John Shaffer.
   ______________________________________________________________________

   This document is available from:
   http://www.cert.org/advisories/CA-2001-08.html
   ______________________________________________________________________

CERT/CC Contact Information

   Email: cert@cert.org
          Phone: +1 412-268-7090 (24-hour hotline)
          Fax: +1 412-268-6989
          Postal address:
          CERT Coordination Center
          Software Engineering Institute
          Carnegie Mellon University
          Pittsburgh PA 15213-3890
          U.S.A.

   CERT personnel answer the hotline 08:00-20:00 EST(GMT-5) / EDT(GMT-4)
   Monday through Friday; they are on call for emergencies during other
   hours, on U.S. holidays, and on weekends.

Using encryption

   We strongly urge you to encrypt sensitive information sent by email.
   Our public PGP key is available from

   http://www.cert.org/CERT_PGP.key

   If you prefer to use DES, please call the CERT hotline for more
   information.

Getting security information

   CERT publications and other security information are available from
   our web site

   http://www.cert.org/

   To subscribe to the CERT mailing list for advisories and bulletins,
   send email to majordomo@cert.org. Please include in the body of your
   message

   subscribe cert-advisory

   * "CERT" and "CERT Coordination Center" are registered in the U.S.
   Patent and Trademark Office.
   ______________________________________________________________________

   NO WARRANTY
   Any material furnished by Carnegie Mellon University and the Software
   Engineering Institute is furnished on an "as is" basis. Carnegie
   Mellon University makes no warranties of any kind, either expressed or
   implied as to any matter including, but not limited to, warranty of
   fitness for a particular purpose or merchantability, exclusivity or
   results obtained from use of the material. Carnegie Mellon University
   does not make any warranty of any kind with respect to freedom from
   patent, trademark, or copyright infringement.
     _________________________________________________________________

   Conditions for use, disclaimers, and sponsorship information

   Copyright 2001 Carnegie Mellon University.

   Revision History
April 10, 2001:  Initial release

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQCVAwUBOtOWzwYcfu8gsZJZAQH4GQP+MpvNtGJX7r+59NaLZFS/GzT0cW8OzE9A
YOrHy1glfgb1WZWjAcuiAqwP+yG4piOwkHfGfvTjIPiM/PrhDt86FjIeblXayS9X
On1VruE8hLM4bPFUs9+5Kq6XsMC5Y1hJxegfg0oJVWsb+9Dd0cyU0IYZrjdW7Lww
FSIbsHoMWG0=
=+4q7
-----END PGP SIGNATURE-----