search menu icon-carat-right cmu-wordmark

CERT Coordination Center

AirSpan Base Station Distribution Unit default root password

Vulnerability Note VU#446403

Original Release Date: 2008-03-21 | Last Revised: 2008-04-01

Overview

AirSpan Base Station Distribution Units may contain an undocumented telnet server that authenticates via a known password and is enabled by default.

Description

From the AirSpan MicroMax product page:

The base station is highly modular in design and is composed of two main components: the all outdoor Base Station Radios (BSR) and the indoor Base Station Distribution Unit (BSDU). Each base station could contain up to 12 BSRs, depending on the amount of available spectrum. Each BSR is connected to the BSDU via a 100BaseT interface operating over a Cat5 cable which carries both data and power.

Per the AirSpan WiMAX MicroMAX vulnerability report site:
AirSpan BSDU has a serious security hole, which allows anyone to get remote access to device with root privileges using undocumented telnet access that is on by default. This is possible because all BSDUs share the same root password

Impact

A remote, unauthenticated attacker may be able to log in to an affected device as the root user.

Solution

Change the default password


Change the default password on affected devices. See AirSpan Product Bulletin PB/ASM/2008/015 Rev A for more information.

Restrict access

Restrict access to the web telnet interface to trusted networks. If possible, configure management and transit networks for separate VLANs, or restrict access to the device using IP access lists.

Vendor Information

446403
 

Airspan Affected

Notified:  March 19, 2008 Updated: March 21, 2008

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Information in this report was provided by the AirSpan WiMAX MicroMAX website.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: None
Severity Metric: 0.75
Date Public: 2008-03-18
Date First Published: 2008-03-21
Date Last Updated: 2008-04-01 15:16 UTC
Document Revision: 15

Sponsored by CISA.