ID

VAR-201008-0272


CVE

CVE-2010-2967


TITLE

Wind River VxWorks loginDefaultEncrypt Algorithm encryption problem vulnerability

Trust: 1.6

sources: IVD: 0183e958-2356-11e6-abef-000c29c66e3d // IVD: 7d753cb1-463f-11e9-876d-000c29342cb1 // CNNVD: CNNVD-201008-031 // CNVD: CNVD-2010-3889

DESCRIPTION

The loginDefaultEncrypt algorithm in loginLib in Wind River VxWorks before 6.9 does not properly support a large set of distinct possible passwords, which makes it easier for remote attackers to obtain access via a (1) telnet, (2) rlogin, or (3) FTP session. It is relatively easy to find a string that has the same hash value as a regular password.Authentication by attacker API (loginLib) May be used to access services using. The hashing algorithm that is used in the standard authentication API for VxWorks is susceptible to collisions. An attacker can brute force a password by guessing a string that produces the same hash as a legitimate password. VxWorks is prone to a security vulnerability due to an insecure-hashing algorithm. The issue affects multiple products from multiple vendors that ship with the VxWorks operating system. NOTE: This document previously covered two vulnerabilities in VxWorks. The remote security-bypass issue has been moved to BID 42158 (VxWorks Debugging Service Security-Bypass Vulnerability) to allow for better documentation of both issues. This flaw occurs due to an insecure password hashing implementation in the authentication library (loginLib) of the VxWorks operating system. Regardless of what password is set for a particular account, there are a only small number (~210k) of possible hash outputs. Typical passwords consisting of alphanumeric characters and symbols fall within an even smaller range of hash outputs (~8k), making this trivial to brute force over the network. To excaberate matters, loginLib has no support for account lockouts and the FTP daemon does not disconnect clients that consistently fail to authenticate. This reduces the brute force time for the FTP service to approximately 30 minutes. To demonstrate the hash weakness, the password of "insecure" hashes to the value "Ry99dzRcy9". The password of "s{{{{{^O" also hashes to the same output. The hashing algorithm itself is based on an additive sum with a small XOR operation. The resulting sums are then transformed to a printable string, but the range of possible intermediate values is limited and mostly sequential. The entire collision table has been precomputed and will be released in early September as an input file for common brute force tools. More information about the hashing algorithm itself is available at the Metasploit blog post below: http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html There are three requirements for this vulnerability to be exploited: * The device must be running at least one service that uses loginLib for authentication. Telnet and FTP do so by default. * A valid username must be known to the attacker. This is usually easy to determine through product manuals or a cursory review of the firmware binaries. * The target service must be using with default loginLib library and must not have changed the authentication function to point to a custom backend. A typical VxWorks device will meet all three requirements by default, but customization by the device manufacturer may preclude this from being exploited. In general, if the device displays a VxWorks banner for Telnet or FTP, it is more than likely vulnerable. -- Vendor Response: Wind River Systems has notified their customers of the issue and suggested that each downstream vendor replace the existing hash implementation with SHA512 or SHA256. The exact extent of the vulnerability and the complete list of affected devices is not known at this time. Example code from Wind River Systems has been supplied to CERT and is included in the advisory below: http://www.kb.cert.org/vuls/id/840249 -- Disclosure Timeline: 2009-06-02 - Vulnerability reported to CERT for vendor notification 2009-08-02 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by HD Moore -- About Rapid7 Security Rapid7 provides vulnerability management, compliance and penetration testing solutions for Web application, network and database security. In addition to developing the NeXpose Vulnerability Management system, Rapid7 manages the Metasploit Project and is the primary sponsor of the W3AF web assessment tool. Our vulnerability disclosure policy is available online at: http://www.rapid7.com/disclosure.jsp

Trust: 4.41

sources: NVD: CVE-2010-2967 // JVNDB: JVNDB-2010-005614 // JVNDB: JVNDB-2010-001882 // CERT/CC: VU#840249 // CNVD: CNVD-2010-3889 // BID: 42114 // IVD: 0183e958-2356-11e6-abef-000c29c66e3d // IVD: 7d753cb1-463f-11e9-876d-000c29342cb1 // VULHUB: VH-CVE-2010-2967 // PACKETSTORM: 92449

IOT TAXONOMY

category:['IoT', 'ICS']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.4

sources: IVD: 0183e958-2356-11e6-abef-000c29c66e3d // IVD: 7d753cb1-463f-11e9-876d-000c29342cb1 // CNVD: CNVD-2010-3889

AFFECTED PRODUCTS

vendor:windrivermodel:vxworksscope:eqversion:6.4

Trust: 1.6

vendor:windrivermodel:vxworksscope:eqversion:5.5

Trust: 1.6

vendor:windrivermodel:vxworksscope:eqversion:6

Trust: 1.6

vendor:windrivermodel:vxworksscope:eqversion:5

Trust: 1.6

vendor:windrivermodel:vxworksscope:lteversion:6.8

Trust: 1.0

vendor:wind rivermodel:vxworksscope:ltversion:6.9

Trust: 0.8

vendor:wind rivermodel:vxworksscope: - version: -

Trust: 0.8

vendor:ericssonmodel: - scope: - version: -

Trust: 0.8

vendor:polycommodel: - scope: - version: -

Trust: 0.8

vendor:wind rivermodel: - scope: - version: -

Trust: 0.8

vendor:windrivermodel:vxworksscope:eqversion:6.8

Trust: 0.6

vendor:windmodel:river systems vxworks throughscope:eqversion:6.56.9

Trust: 0.6

vendor:vxworksmodel: - scope:eqversion:5

Trust: 0.4

vendor:vxworksmodel: - scope:eqversion:5.5

Trust: 0.4

vendor:vxworksmodel: - scope:eqversion:6

Trust: 0.4

vendor:vxworksmodel: - scope:eqversion:6.4

Trust: 0.4

vendor:vxworksmodel: - scope:eqversion:*

Trust: 0.4

vendor:windmodel:river systems vxworksscope:eqversion:0

Trust: 0.3

sources: NVD: CVE-2010-2967 // IVD: 0183e958-2356-11e6-abef-000c29c66e3d // IVD: 7d753cb1-463f-11e9-876d-000c29342cb1 // CNNVD: CNNVD-201008-031 // CNVD: CNVD-2010-3889 // JVNDB: JVNDB-2010-005614 // JVNDB: JVNDB-2010-001882 // BID: 42114 // CERT/CC: VU#840249

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2010-2967
value: HIGH

Trust: 1.8

CARNEGIE MELLON: VU#840249
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201008-031
value: HIGH

Trust: 0.6

CNVD: CNVD-2010-3889
value: HIGH

Trust: 0.6

IVD: 0183e958-2356-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

IVD: 7d753cb1-463f-11e9-876d-000c29342cb1
value: HIGH

Trust: 0.2

VUL-HUB: VH-CVE-2010-2967
value: HIGH RISK

Trust: 0.1

NVD: CVE-2010-2967
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.8

CARNEGIE MELLON: VU#840249
severity: HIGH
baseScore: 10.0
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2010-3889
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 0183e958-2356-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 7d753cb1-463f-11e9-876d-000c29342cb1
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

VULHUB: VH-CVE-2010-2967
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: NVD: CVE-2010-2967 // IVD: 0183e958-2356-11e6-abef-000c29c66e3d // IVD: 7d753cb1-463f-11e9-876d-000c29342cb1 // CNNVD: CNNVD-201008-031 // CNVD: CNVD-2010-3889 // JVNDB: JVNDB-2010-005614 // CERT/CC: VU#840249 // VULHUB: VH-CVE-2010-2967

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

sources: NVD: CVE-2010-2967 // JVNDB: JVNDB-2010-005614 // VULHUB: VH-CVE-2010-2967

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201008-031

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-201008-031

CONFIGURATIONS

sources: NVD: CVE-2010-2967

PATCH

title:Top Pageurl:http://www.windriver.com/

Trust: 0.8

title:Top Pageurl:http://windriver.com/

Trust: 0.8

sources: JVNDB: JVNDB-2010-005614 // JVNDB: JVNDB-2010-001882

EXTERNAL IDS

db:CERT/CCid:VU#840249

Trust: 4.4

db:NVDid:CVE-2010-2967

Trust: 3.5

db:CNNVDid:CNNVD-201008-031

Trust: 1.1

db:CNVDid:CNVD-2010-3889

Trust: 1.0

db:JVNDBid:JVNDB-2010-005614

Trust: 0.8

db:JVNDBid:JVNDB-2010-001882

Trust: 0.8

db:ICS CERTid:ICSA-10-214-01

Trust: 0.8

db:BIDid:42114

Trust: 0.3

db:IVDid:0183E958-2356-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:7D753CB1-463F-11E9-876D-000C29342CB1

Trust: 0.2

db:VULHUBid:VH-CVE-2010-2967

Trust: 0.1

db:PACKETSTORMid:92449

Trust: 0.1

sources: NVD: CVE-2010-2967 // IVD: 0183e958-2356-11e6-abef-000c29c66e3d // IVD: 7d753cb1-463f-11e9-876d-000c29342cb1 // CNNVD: CNNVD-201008-031 // CNVD: CNVD-2010-3889 // JVNDB: JVNDB-2010-005614 // JVNDB: JVNDB-2010-001882 // BID: 42114 // CERT/CC: VU#840249 // VULHUB: VH-CVE-2010-2967 // PACKETSTORM: 92449

REFERENCES

url:http://www.kb.cert.org/vuls/id/840249

Trust: 3.6

url:http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html

Trust: 2.6

url:http://www.kb.cert.org/vuls/id/mapg-863qh9

Trust: 2.4

url:https://support.windriver.com/olsportal/faces/maintenance/downloaddetails.jspx?contentid=033709

Trust: 2.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2967

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2967

Trust: 0.8

url:http://jvn.jp/cert/jvnvu840249

Trust: 0.8

url:https://community.rapid7.com/community/metasploit/blog/2010/08/02/shiny-old-vxworks-vulnerabilities

Trust: 0.8

url:http://www.us-cert.gov/control_systems/pdf/icsa-10-214-01_vxworks_vulnerabilities.pdf

Trust: 0.8

url:http://blogs.windriver.com/chauhan/2010/08/vxworks-secure.html

Trust: 0.8

url:http://newsoft-tech.blogspot.com/2010/09/follow-up-on-vxworks-issue.html

Trust: 0.8

url:http://cvk.posterous.com/how-to-crack-vxworks-password-hashes

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/798.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/327.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/916.html

Trust: 0.8

url:http://www.windriver.com/

Trust: 0.3

url:/archive/1/512827

Trust: 0.3

url:/archive/1/512842

Trust: 0.3

url:http://www.rapid7.com/disclosure.jsp

Trust: 0.1

sources: NVD: CVE-2010-2967 // CNNVD: CNNVD-201008-031 // CNVD: CNVD-2010-3889 // JVNDB: JVNDB-2010-005614 // JVNDB: JVNDB-2010-001882 // BID: 42114 // CERT/CC: VU#840249 // PACKETSTORM: 92449

CREDITS

HD Moore

Trust: 0.3

sources: BID: 42114

SOURCES

db:NVDid:CVE-2010-2967
db:IVDid:0183e958-2356-11e6-abef-000c29c66e3d
db:IVDid:7d753cb1-463f-11e9-876d-000c29342cb1
db:CNNVDid:CNNVD-201008-031
db:CNVDid:CNVD-2010-3889
db:JVNDBid:JVNDB-2010-005614
db:JVNDBid:JVNDB-2010-001882
db:BIDid:42114
db:CERT/CCid:VU#840249
db:VULHUBid:VH-CVE-2010-2967
db:PACKETSTORMid:92449

LAST UPDATE DATE

2021-12-18T15:57:33.115000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2010-2967date:2010-08-05T13:22:00
db:IVDid:0183e958-2356-11e6-abef-000c29c66e3ddate: -
db:IVDid:7d753cb1-463f-11e9-876d-000c29342cb1date: -
db:CNNVDid:CNNVD-201008-031date:2010-08-06T00:00:00
db:CNVDid:CNVD-2010-3889date:2010-08-05T00:00:00
db:JVNDBid:JVNDB-2010-005614date:2012-12-20T00:00:00
db:JVNDBid:JVNDB-2010-001882date:2010-08-26T00:00:00
db:BIDid:42114date:2010-08-05T19:46:00
db:CERT/CCid:VU#840249date:2014-06-02T00:00:00
db:VULHUBid:VH-CVE-2010-2967date:2020-11-04T00:00:00
db:PACKETSTORMid:92449date: -

SOURCES RELEASE DATE

db:NVDid:CVE-2010-2967date:2010-08-05T13:22:00
db:IVDid:0183e958-2356-11e6-abef-000c29c66e3ddate:2010-08-05T00:00:00
db:IVDid:7d753cb1-463f-11e9-876d-000c29342cb1date:2010-08-05T00:00:00
db:CNNVDid:CNNVD-201008-031date:2010-08-05T00:00:00
db:CNVDid:CNVD-2010-3889date:2010-08-05T00:00:00
db:JVNDBid:JVNDB-2010-005614date:2012-12-20T00:00:00
db:JVNDBid:JVNDB-2010-001882date:2010-08-26T00:00:00
db:BIDid:42114date:2010-08-02T00:00:00
db:CERT/CCid:VU#840249date:2010-08-02T00:00:00
db:VULHUBid:VH-CVE-2010-2967date:2010-08-04T00:00:00
db:PACKETSTORMid:92449date:2010-08-03T18:01:12