ID

VAR-E-201008-0090


CVE

cve_id:CVE-2010-2965

Trust: 0.3

sources: BID: 42158

TITLE

3COM NBX V3000 Networked Telephony Solution Information Disclosure

Trust: 0.6

sources: EDBNET: 76121

AFFECTED PRODUCTS

vendor:vxworksmodel:r5 0 31 datascope: - version: -

Trust: 0.5

vendor:xeroxmodel:phaser 3635mfpscope:eqversion:0

Trust: 0.3

vendor:windmodel:river systems vxworksscope:eqversion:0

Trust: 0.3

vendor:proximmodel:oronoco ap600scope:eqversion:2.5.5(1070)

Trust: 0.3

vendor:proximmodel:oronoco ap600scope:eqversion:2.5.3(914)

Trust: 0.3

vendor:proximmodel:oronoco ap600scope:eqversion:2.5.2(894)

Trust: 0.3

vendor:proximmodel:oronoco ap600scope:eqversion:2.4.5(758)

Trust: 0.3

vendor:proximmodel:oronoco ap600scope:eqversion:2.4.11(821)

Trust: 0.3

vendor:proximmodel:oronoco ap600scope:eqversion:2.2.0(460)

Trust: 0.3

vendor:proximmodel:oronoco ap600scope:eqversion:2.1.1(403)

Trust: 0.3

vendor:proximmodel:oronoco ap600scope: - version: -

Trust: 0.3

vendor:paradynemodel:grandslamscope:eqversion:4200

Trust: 0.3

vendor:nortelmodel:networks wlan access pointscope:eqversion:2220

Trust: 0.3

vendor:nortelmodel:networks passportscope:eqversion:1100/1150/1200/1250

Trust: 0.3

vendor:nortelmodel:networks optical trouble ticketingscope:eqversion:0

Trust: 0.3

vendor:kathreinmodel:cmts038-007 cmts2.6.0scope: - version: -

Trust: 0.3

vendor:kathreinmodel:cmts038-007 cmts2.17.0scope: - version: -

Trust: 0.3

vendor:kathreinmodel:cmts038-007 cmts2.14.0scope: - version: -

Trust: 0.3

vendor:kathreinmodel:cmts038-007 cmts2.11.0scope: - version: -

Trust: 0.3

vendor: - model:gaoke co mg6000 voip gatewayscope:eqversion:0

Trust: 0.3

vendor:foundrymodel:networks edgeiron 4802fscope:eqversion:1.4.8

Trust: 0.3

vendor:foundrymodel:networks edgeiron 4802fscope:eqversion:1.3.7

Trust: 0.3

vendor:foundrymodel:networks edgeiron 4802fscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:onsscope:eqversion:154540

Trust: 0.3

vendor:ciscomodel:ip phonescope:eqversion:7920

Trust: 0.3

vendor:arrismodel:cadant c3 cmtsscope:eqversion:0

Trust: 0.3

vendor:alcatel lucentmodel:omniswitch 5.1.5.245.r04scope: - version: -

Trust: 0.3

sources: BID: 42158 // PACKETSTORM: 121875

EXPLOIT

*Known Affected Versions: *R5_0_31 (Created March 1st, 2007)
*Date Discovered: *November 13, 2012

Obviously not anything new to get sensitive data out via the VxWorks remote
debugger, but this seemed to warrant specific attention since it did allow
for the disclosure of call logs and full access to all voice mails stored
on the system. Vendor has stopped responding. There was some data around
this system and the phones themselves for extracting configuration data
released a while back but I have not found anything specific around the PBX
switch out there.

*Synopsis: *The 3Com NBX V3000 phone system firmware was found to have the
VxWorks remote debug service documented at
http://www.kb.cert.org/vuls/id/362332 enabled. This allows for remotely
extracting the contents of device memory over the network. When parsing
the contents of memory, it was discovered that the call logs for the system
as well as URLs which linked to WAV files containing voice mails that were
accessible with no authentication were stored within the extracted
content.

*Reported to Vendor: *December 23rd, 2012
*Vendor Acknowledgement: *December 24th, 2012
*Last Vendor Response: *January 16th, 2013 (No Resolution)

Vulnerability Reproduction:

1. Use the Metasploit VxWorks WDB Agent module (*
auxiliary/admin/vxworks/wdbrpc_memory_dump)* to extract the contents of
memory targeted at the IP of the PBX.

2. Extract the strings from the dump file generated by Metasploit and grep
for HTTP links containing port 8889 to obtain voice mail URLs, also grep
for names/numbers etc. for sensitive data.

Trust: 0.6

sources: EDBNET: 76121

PRICE

free

Trust: 0.6

sources: EDBNET: 76121

TYPE

info disclosure

Trust: 0.5

sources: PACKETSTORM: 121875

TAGS

tag:exploit

Trust: 0.5

tag:remote

Trust: 0.5

tag:info disclosure

Trust: 0.5

sources: PACKETSTORM: 121875

EXTERNAL IDS

db:CERT/CCid:VU#362332

Trust: 1.4

db:EDBNETid:76121

Trust: 0.6

db:PACKETSTORMid:121875

Trust: 0.5

db:NVDid:CVE-2010-2965

Trust: 0.3

db:BIDid:42158

Trust: 0.3

sources: BID: 42158 // PACKETSTORM: 121875 // EDBNET: 76121

REFERENCES

url:https://www.intelligentexploit.com

Trust: 0.6

url:http://www.kb.cert.org/vuls/id/362332

Trust: 0.3

url:http://download.schneider-electric.com/files?p_doc_ref=sevd%202013-345-01

Trust: 0.3

url:http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html

Trust: 0.3

url:http://www.windriver.com/

Trust: 0.3

sources: BID: 42158 // EDBNET: 76121

SOURCES

db:BIDid:42158
db:PACKETSTORMid:121875
db:EDBNETid:76121

LAST UPDATE DATE

2022-07-27T09:54:51.399000+00:00


SOURCES UPDATE DATE

db:BIDid:42158date:2015-03-19T08:47:00

SOURCES RELEASE DATE

db:BIDid:42158date:2010-08-02T00:00:00
db:PACKETSTORMid:121875date:2013-06-04T18:11:22
db:EDBNETid:76121date:2013-06-05T00:00:00