Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:13376
HistoryJun 30, 2006 - 12:00 a.m.

Digital Armaments Security Advisory 29.06.2006: Siemens Speedstream Wireless Router Password Protection Bypass Vulnerability

2006-06-3000:00:00
vulners.com
9

Digital Armaments advisory is 05.02.2006
http://www.digitalarmaments.com/2006290674551938.html

I. Background

The SpeedStream Wireless DSL/Cable Router is usually adopted for home and small business solutions.
Together with an existing DSL or cable modem connection, this affordable, easy to use connection
sharing solution brings the freedom of high-speed, wireless broadband connectivity to home and SOHO
networks. Its comprehensive functionality provides vital firewall protection, IP sharing capabilities,
and fundamental routing features that support popular protocols like NetMeeting and VPN.
For further information or detail about the software you can refer to the vendor's homepage:

http://subscriber.communications.siemens.com/

II. Problem Description

Speedstream routers have UPnP/1.0 support. An attacker can access protected files and bypass the
password protection without login using the UPnP part of the tree.

III. Detection

This problem has been detected on latest version of Siemens Speedstrem Router. It has been tested on
the Speedstream 2624.

IV. Impact analysis

Successful exploitation allow an attacker to bypass the password protection. It also allow an attacker
to access protected files without login.

V. Solution

First notification 05.02.2006.
Second notification 05.20.2006.
No answer from the vendor.

VI. Credit

Jaime Blasco - [email protected] is credited with this discovery.

Get paid and get stocks by vulnerability submission
http://www.digitalarmaments.com/contribute.html

VII. Legal Notices

Copyright © 2006 Digital Armaments LLC.

Redistribution of this alert electronically is allowed. It should not be edited in any way. Reprint
the whole is allowed, partial reprint is not permitted. For any other request please email
[email protected] for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based
on currently available information. Use of the information constitutes acceptance for use in an AS IS
condition. There are no warranties with regard to this information. Neither the author nor the
publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from
use of, or reliance on, this information.