Trustwave SpiderLabs Security Advisory TWSL2019-007:
Vulnerabilities in Comba Products
Published: Currently unpublished
Version: 1.0
Vendor: Comba (http://www.comba-telecom.com/)
Finding 1: Remote and Local Password Disclosure
***************Credit: Simon Kenin of Trustwave
Product: AC2400
Version affected: All
Product description:
Wi-Fi Access Controller
Comba AC2400 prone to password disclosure via simple crafted request to the web
management server.
PoC:
====
https://127.0.0.1/09/business/upgrade/upcfgAction.php?download=true
This request doesnt require any authentication and will lead to saving the
DBconfig.cfg file. In the end of the file the login information is stored in
plain text, for examle:
#**#admin#**#system#**#61d217fd8a8869f6d26887d298ce9a69#**#0#**#3#**#2#**#2#**#2017-01-01#**#forever
The username is admin, with system privileges and the md5 of his password is
61d217fd8a8869f6d26887d298ce9a69 (trustwave). MD5 is very easy to break, if
SSH/Telnet is enabled this could lead to full takeover of the filesystem of the
device.
-=-=-=-=-=-=-=-=-=-=-
Finding 2: Remote and Local Password Disclosure
***************Credit: Simon Kenin of Trustwave
Product: AP2600-I,A02,0202N00PD2
Version affected: All
Product description:
AP2600-I series is a high-performance indoor Access Point, can provide Wi-Fi
coverage for both 2.4GHz and 5GHz band.
Comba AP2600 prone to password disclosure via insecure authentication mechanisem.
PoC:
====
Looking at the HTML code of the login page you would see the following lines:
//admin
//trustwave
The username & password values are double md5 of the plaintext real value
md5(md5(value))
-=-=-=-=-=-=-=-=-=-=-
Finding3: Remote and Local Password Disclosure
***************Credit: Simon Kenin of Trustwave
Product: AP2600-I,A02,0202N00PD2
Version affected: All
Product description:
AP2600-I series is a high-performance indoor Access Point, can provide Wi-Fi
coverage for both 2.4GHz and 5GHz band.
Comba AP2600 prone to password disclosure via simple crafted request to the web
management server.
PoC:
====
https://127.0.0.1/goform/downloadConfigFile
This request doesnt require any authentication and will lead to saving the
femtoOamStore.db file. The file is sqlite db file, the username and password
are stored in plain text in a table named "TABLE_SERVICE_INF".
Vendor Response:
Non-responsive
Remediation Steps:
No patches or workarounds for these issues are currently available
Revision History:
02/15/2019 - Vendor contacted with no response
03/28/2019 - Vendor contacted with no response
07/31/2019 - Vendor contacted with no response
09/10/2019 - Advisory published
About Trustwave:
Trustwave is the leading provider of on-demand and subscription-based
information security and payment card industry compliance management
solutions to businesses and government entities throughout the world. For
organizations faced with today's challenging data security and compliance
environment, Trustwave provides a unique approach with comprehensive
solutions that include its flagship TrustKeeper compliance management
software and other proprietary security solutions. Trustwave has helped
thousands of organizations--ranging from Fortune 500 businesses and large
financial institutions to small and medium-sized retailers--manage
compliance and secure their network infrastructure, data communications and
critical information assets. Trustwave is headquartered in Chicago with
offices throughout North America, South America, Europe, Africa, China and
Australia. For more information, visit https://www.trustwave.com
About Trustwave SpiderLabs:
SpiderLabs(R) is the advanced security team at Trustwave focused on
application security, incident response, penetration testing, physical
security and security research. The team has performed over a thousand
incident investigations, thousands of penetration tests and hundreds of
application security tests globally. In addition, the SpiderLabs Research
team provides intelligence through bleeding-edge research and proof of
concept tool development to enhance Trustwave's products and services.
https://www.trustwave.com/spiderlabs
Disclaimer:
The information provided in this advisory is provided "as is" without
warranty of any kind. Trustwave disclaims all warranties, either express or
implied, including the warranties of merchantability and fitness for a
particular purpose. In no event shall Trustwave or its suppliers be liable
for any damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages, even if
Trustwave or its suppliers have been advised of the possibility of such
damages. Some states do not allow the exclusion or limitation of liability
for consequential or incidental damages so the foregoing limitation may not
apply.