Netopia Router Crafted SNMP Request Remote Admin Password Disclosure

critical Nessus Plugin ID 22415

Synopsis

The remote router allows anonymous users to retrieve the administrative password

Description

The remote host appears to be running a Netopia router with SNMP enabled.
Further, the Netopia router is using the default SNMP community strings.
This version of the Netopia firmware is vulnerable to a flaw wherein a remote attacker can, by sending a specially formed SNMP query, retrieve the Administrative password.

An attacker, exploiting this flaw, would only need to be able to send SNMP queries to the router using the default community string of 'public'.
Successful exploitation would result in the attacker gaining administrative credentials to the router.

Solution

Contact the vendor for a patch. Change the default SNMP community string to one that is not easily guessed.

See Also

http://www.netopia.com/

Plugin Details

Severity: Critical

ID: 22415

File Name: snmp_netopia.nasl

Version: 1.16

Type: remote

Family: Misc.

Published: 9/20/2006

Updated: 11/8/2023

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: Score based on an in-depth analysis by tenable.

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: manual

Vulnerability Information

Required KB Items: SNMP/community