Overview
RuggedCom Rugged Operating System (ROS) contains a hard-coded user account with a predictable password.
Description
RuggedCom Rugged Operating System (ROS), used in RuggedCom network infrastructure devices, contains a hard-coded user account named "factory" that cannot be disabled. The password for this account is based on the device's MAC address and can be reverse engineered easily (CWE-261: Weak Cryptography for Passwords). ROS also supports HTTP(S) and ssh services. In ROS 3.3.x, these services do not use the factory account. ROS does not appear to log successful or unsuccessful login attempts for the factory account. |
Impact
An attacker with knowledge of an ROS device's MAC address may be able to gain complete administrative control of the device. The MAC address is displayed in the pre-authentication banner. |
Solution
According to RuggedCom's security bulletin, "Version 3.10.1 of the ROS® firmware with security related fixes will be released on Tuesday May 22, 2012 and can be obtained by emailing support@ruggedcom.com. Other ROS® firmware versions containing the same security fixes (3.9.3, 3.8.5, 3.7.9 & 3.11.0) will be released over the next few weeks on a staggered basis as development and testing is completed." |
Workarounds |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 8.5 | AV:N/AC:M/Au:S/C:C/I:C/A:C |
Temporal | 7.3 | E:POC/RL:W/RC:C |
Environmental | 1.8 | CDP:ND/TD:L/CR:ND/IR:ND/AR:ND |
References
- http://seclists.org/fulldisclosure/2012/Apr/277
- http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-116-01.pdf
- http://arstechnica.com/business/news/2012/04/backdoor-in-mission-critical-hardware-threatens-power-traffic-control-systems.ars
- http://www.wired.com/threatlevel/2012/04/ruggedcom-backdoor/
- http://www.ruggedcom.com/products/index.php
- http://www.ruggedcom.com/support/software/index.php
- http://cwe.mitre.org/data/definitions/261.html
- http://www.ruggedcom.com/productbulletin/ros-security-page/
- https://www.us-cert.gov/control_systems/pdf/ICSA-12-146-01.pdf
- http://www.us-cert.gov/control_systems/pdf/ICSA-12-146-01A.pdf
Acknowledgements
Thanks to Justin W. Clarke, an independent security researcher in San Francisco, California, for reporting this vulnerability. Thanks also to ICS-CERT for testing and additional coordination with RuggedCom.
This document was written by Michael Orlando and Art Manion.
Other Information
CVE IDs: | CVE-2012-1803 |
Date Public: | 2012-04-23 |
Date First Published: | 2012-04-24 |
Date Last Updated: | 2012-07-18 20:09 UTC |
Document Revision: | 67 |