Inteno EG200 EG200-WU7P1U_ADAMO3.16.4-190226_1650 routers have a JUCI ACL misconfiguration that allows the "user" account to extract the 3DES key via JSON commands to ubus. The 3DES key is used to decrypt the provisioning file provided by Adamo Telecom on a public URL via cleartext HTTP.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154494/Inteno-IOPSYS-Gateway-3DES-Key-Extraction-Improper-Access.html | Exploit Third Party Advisory VDB Entry |
https://twitter.com/GerardFuguet/status/1169298861782896642 | Third Party Advisory |
https://www.exploit-db.com/docs/47397 | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/47390 | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-09-16T16:24:48
Updated: 2019-09-18T19:18:36
Reserved: 2019-07-01T00:00:00
Link: CVE-2019-13140
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-09-16T17:15:13.277
Modified: 2022-03-31T17:47:15.780
Link: CVE-2019-13140
JSON object: View
Redhat Information
No data.
CWE