search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Cayman gateways ship with null administrative and user level passwords

Vulnerability Note VU#557136

Original Release Date: 2001-08-27 | Last Revised: 2001-08-27

Overview

Cayman gateways ship without a default password on the admin and user accounts. As long as the gateway is not addressable via the WAN, this can only be accessed and set by anyone on the LAN side. With admin access, the gateway settings can be configured by an intruder.

Description

Cayman gateways ship without a default password on the admin and user accounts permitting unauthenticated access via TELNET, HTTP and FTP. There is an Alert message that appears on every webpage served by the router, and on the initial configuration screen until the admin password is set. As long as the gateway is not addressable via the WAN, these passwords can only be set by anyone on the LAN side.

Administrative access allows the intruder to configure and save various settings on the gateway.

User level access only permits the viewing of these settings.

Impact

These vulnerabilities are the result of weak authentication and access control policies and result in one or more of the following impacts: unauthorized access, unauthorized monitoring, information leakage, denial of service, and permanent disability of affected devices.

Solution

Set a password for your ADSL modem on both the admin and user accounts.

According to Cayman, this is done at the request of Cayman customers (major broadband service providers) and is considered to be the end user's responsibility to set.

Vendor Information

557136
 

Cayman Affected

Notified:  April 25, 2001 Updated: August 27, 2001

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

According to Cayman, this is done at the request of Cayman customers (major broadband service providers) and is considered to be the end user's responsibility to set.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Our thanks to Kolya Miller, who brought this to the attention of the vendor, and the CERT/CC.

This document was written by Jason Rafail.

Other Information

CVE IDs: None
Severity Metric: 45.00
Date Public: 2001-07-11
Date First Published: 2001-08-27
Date Last Updated: 2001-08-27 15:12 UTC
Document Revision: 10

Sponsored by CISA.