Overview
The hashing algorithm that is used in the standard authentication API for VxWorks is susceptible to collisions. An attacker can brute force a password by guessing a string that produces the same hash as a legitimate password.
Description
An attacker with a known username and access to a service (telnet, rlogin or FTP) that uses the standard authentication API (loginDefaultEncrypt (), part of loginLib) can brute force the password in a relatively short period of time. Since the hashing algorithm is susceptible to collisions, the actual password does not have to be found, just a string that produces the same hash. For instance, when the default 'target/password' login example is used, 'y{{{{{kS' hashes to the same string as 'password'. It is thus possible to login using both 'password' and 'y{{{{{kS' as the passwords for the user 'target'. |
Impact
An attacker can brute force a correct password by guessing a string that produces the same hash and access the relevant service as the known user. |
Solution
Vendors which use VxWorks in their products should not use the default hashing algorithm in standard authentication API (loginDefaultEncrypt()). A trusted authentication API should be used instead. It can be installed by means of the loginEncryptInstall() loginLib hook. |
Restrict access Appropriate firewall rules should be implemented to restrict access to any services that use the standard authentication API. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Temporal | 9.5 | E:H/RL:W/RC:C |
Environmental | 9.5 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
- https://community.rapid7.com/community/metasploit/blog/2010/08/02/shiny-old-vxworks-vulnerabilities
- http://www.us-cert.gov/control_systems/pdf/ICSA-10-214-01_VxWorks_Vulnerabilities.pdf
- http://blogs.windriver.com/chauhan/2010/08/vxworks-secure.html
- https://support.windriver.com/olsPortal/faces/maintenance/downloadDetails.jspx?contentId=033709
- http://newsoft-tech.blogspot.com/2010/09/follow-up-on-vxworks-issue.html
- http://cvk.posterous.com/how-to-crack-vxworks-password-hashes
- http://cwe.mitre.org/data/definitions/798.html
- http://cwe.mitre.org/data/definitions/327.html
- http://cwe.mitre.org/data/definitions/916.html
Acknowledgements
Thanks to HD Moore for reporting this vulnerability.
This document was written by Jared Allar.
Other Information
CVE IDs: | CVE-2010-2967 |
Severity Metric: | 23.63 |
Date Public: | 2010-08-02 |
Date First Published: | 2010-08-02 |
Date Last Updated: | 2014-06-02 20:31 UTC |
Document Revision: | 60 |