Overview
Firmware developed by Hughes Network Systems used in a number of BGAN satellite terminals contains undocumented hardcoded login credentials (CWE-798). Additionally, the firmware contains an insecure proprietary communications protocol, likely a debugging service, that allows unauthenticated local network users to perform privileged operations on the device (CWE-306).
Description
CWE-798: Use of Hard-coded Credentials - CVE-2013-6034 Firmware developed by Hughes Network Systems and used in numerous broadband satellite terminals contain hardcoded login credentials. Most of these devices are utilized for broadband connectivity through the Inmarsat satellite telecommunications network.
Hughes Network Systems:
Thuraya Telecommunications Company:
Japan Radio Corp., Ltd.:
CERT/CC has confirmed that the affected firmware is developed by Hughes Network Systems. GateHouse produces a BGAN network stack that is licensed to Hughes Network Systems, but the GateHouse software does not provide either of the vulnerable features. Please see the "Vendor Information" below for more details. The CVSS score reflects CVE-2013-6035. |
Impact
Depending on implementation, an unauthenticated attacker may be able to gain privileged access to the device. Additionally, an unauthenticated attacker on the local network may be able to execute arbitrary code on the device. |
Solution
We are currently unaware of a practical solution to this problem. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 5.7 | AV:A/AC:M/Au:N/C:C/I:N/A:N |
Temporal | 4.8 | E:U/RL:U/RC:C |
Environmental | 1.2 | CDP:N/TD:L/CR:ND/IR:ND/AR:ND |
References
- http://rf.harris.com/capabilities/tactical-radios-networking/rf-7800b/default.asp
- http://www.hughes.com/technologies/mobilesat-systems/mobile-satellite-terminals
- http://www.thuraya.com/thuraya-ip
- http://www.jrc.co.jp/eng/product/marine/application/comm_inmarsat.html
- http://www.inmarsateu.net/
- http://www.inmarsat.com/Support/detailsupport/bgan/Firmware/index.htm
- http://www.inmarsat.com/Support/detailsupport/FleetBroadband/Firmware/index.htm
- http://www.thuraya.com/product_upgrades/41
- http://www.gatehouse.dk/
- http://www.inmarsat.com/service/bgan/
- http://en.wikipedia.org/wiki/BGAN
Acknowledgements
Thanks to IOActive researcher Ruben Santamarta for reporting this vulnerability.
This document was written by Todd Lewellen and Chris King.
Other Information
CVE IDs: | CVE-2013-6034, CVE-2013-6035 |
Date Public: | 2014-01-31 |
Date First Published: | 2014-01-31 |
Date Last Updated: | 2014-08-14 04:17 UTC |
Document Revision: | 67 |