ID
VAR-E-201008-0090
CVE
cve_id: | CVE-2010-2965 | Trust: 0.3 |
TITLE
3COM NBX V3000 Networked Telephony Solution Information Disclosure
Trust: 0.6
AFFECTED PRODUCTS
vendor: | vxworks | model: | r5 0 31 data | scope: | - | version: | - | Trust: 0.5 |
vendor: | xerox | model: | phaser 3635mfp | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | wind | model: | river systems vxworks | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | proxim | model: | oronoco ap600 | scope: | eq | version: | 2.5.5(1070) | Trust: 0.3 |
vendor: | proxim | model: | oronoco ap600 | scope: | eq | version: | 2.5.3(914) | Trust: 0.3 |
vendor: | proxim | model: | oronoco ap600 | scope: | eq | version: | 2.5.2(894) | Trust: 0.3 |
vendor: | proxim | model: | oronoco ap600 | scope: | eq | version: | 2.4.5(758) | Trust: 0.3 |
vendor: | proxim | model: | oronoco ap600 | scope: | eq | version: | 2.4.11(821) | Trust: 0.3 |
vendor: | proxim | model: | oronoco ap600 | scope: | eq | version: | 2.2.0(460) | Trust: 0.3 |
vendor: | proxim | model: | oronoco ap600 | scope: | eq | version: | 2.1.1(403) | Trust: 0.3 |
vendor: | proxim | model: | oronoco ap600 | scope: | - | version: | - | Trust: 0.3 |
vendor: | paradyne | model: | grandslam | scope: | eq | version: | 4200 | Trust: 0.3 |
vendor: | nortel | model: | networks wlan access point | scope: | eq | version: | 2220 | Trust: 0.3 |
vendor: | nortel | model: | networks passport | scope: | eq | version: | 1100/1150/1200/1250 | Trust: 0.3 |
vendor: | nortel | model: | networks optical trouble ticketing | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | kathrein | model: | cmts038-007 cmts2.6.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | kathrein | model: | cmts038-007 cmts2.17.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | kathrein | model: | cmts038-007 cmts2.14.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | kathrein | model: | cmts038-007 cmts2.11.0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | - | model: | gaoke co mg6000 voip gateway | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | foundry | model: | networks edgeiron 4802f | scope: | eq | version: | 1.4.8 | Trust: 0.3 |
vendor: | foundry | model: | networks edgeiron 4802f | scope: | eq | version: | 1.3.7 | Trust: 0.3 |
vendor: | foundry | model: | networks edgeiron 4802f | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | cisco | model: | ons 15454sdh | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | cisco | model: | ons | scope: | eq | version: | 154540 | Trust: 0.3 |
vendor: | cisco | model: | ip phone | scope: | eq | version: | 7920 | Trust: 0.3 |
vendor: | arris | model: | cadant c3 cmts | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | alcatel lucent | model: | omniswitch 5.1.5.245.r04 | scope: | - | version: | - | Trust: 0.3 |
EXPLOIT
*Known Affected Versions: *R5_0_31 (Created March 1st, 2007)
*Date Discovered: *November 13, 2012
Obviously not anything new to get sensitive data out via the VxWorks remote
debugger, but this seemed to warrant specific attention since it did allow
for the disclosure of call logs and full access to all voice mails stored
on the system. Vendor has stopped responding. There was some data around
this system and the phones themselves for extracting configuration data
released a while back but I have not found anything specific around the PBX
switch out there.
*Synopsis: *The 3Com NBX V3000 phone system firmware was found to have the
VxWorks remote debug service documented at
http://www.kb.cert.org/vuls/id/362332 enabled. This allows for remotely
extracting the contents of device memory over the network. When parsing
the contents of memory, it was discovered that the call logs for the system
as well as URLs which linked to WAV files containing voice mails that were
accessible with no authentication were stored within the extracted
content.
*Reported to Vendor: *December 23rd, 2012
*Vendor Acknowledgement: *December 24th, 2012
*Last Vendor Response: *January 16th, 2013 (No Resolution)
Vulnerability Reproduction:
1. Use the Metasploit VxWorks WDB Agent module (*
auxiliary/admin/vxworks/wdbrpc_memory_dump)* to extract the contents of
memory targeted at the IP of the PBX.
2. Extract the strings from the dump file generated by Metasploit and grep
for HTTP links containing port 8889 to obtain voice mail URLs, also grep
for names/numbers etc. for sensitive data.
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
info disclosure
Trust: 0.5
TAGS
tag: | exploit | Trust: 0.5 |
tag: | remote | Trust: 0.5 |
tag: | info disclosure | Trust: 0.5 |
EXTERNAL IDS
db: | CERT/CC | id: | VU#362332 | Trust: 1.4 |
db: | EDBNET | id: | 76121 | Trust: 0.6 |
db: | PACKETSTORM | id: | 121875 | Trust: 0.5 |
db: | NVD | id: | CVE-2010-2965 | Trust: 0.3 |
db: | BID | id: | 42158 | Trust: 0.3 |
REFERENCES
url: | https://www.intelligentexploit.com | Trust: 0.6 |
url: | http://www.kb.cert.org/vuls/id/362332 | Trust: 0.3 |
url: | http://download.schneider-electric.com/files?p_doc_ref=sevd%202013-345-01 | Trust: 0.3 |
url: | http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html | Trust: 0.3 |
url: | http://www.windriver.com/ | Trust: 0.3 |
SOURCES
db: | BID | id: | 42158 |
db: | PACKETSTORM | id: | 121875 |
db: | EDBNET | id: | 76121 |
LAST UPDATE DATE
2022-07-27T09:54:51.399000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 42158 | date: | 2015-03-19T08:47:00 |
SOURCES RELEASE DATE
db: | BID | id: | 42158 | date: | 2010-08-02T00:00:00 |
db: | PACKETSTORM | id: | 121875 | date: | 2013-06-04T18:11:22 |
db: | EDBNET | id: | 76121 | date: | 2013-06-05T00:00:00 |