The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


3Com switches - undocumented access level.)


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
X-RDate: Tue, 12 May 1998 11:57:50 +0600 (YEKST)
X-UIDL: 35317d3400000225
Date: Sun, 10 May 1998 14:41:37 -0500
From: Aleph One <aleph1@NATIONWIDE.NET.>
To: [email protected]
Subject: Re: 3Com switches - undocumented access level.)

Summary of multiple posts on the subject:

Riku Meskanen <mesrik@cc.jyu.fi.>

LanPlex2500/Corebuilder
- login:    debug
- password: synnet

LinkSwitch 2700, SuperStack 2700, CellPlex 7000
- login:    tech
- password: tech

SuperStack II 1000 ja SuperStack II 3000
- login:    monitor
- password: monitor


Joel Moses <jmoses@dttus.com.>

CoreBuilder 7000-series has the problem. It is safe to change that
password on this model. Please note that if you have multiple management
cards, each one will have the password enabled.


Philippe Regnauld <regnauld@deepo.prosa.dk.>

Netbuilder 2xx (v. SW/NBRO-AB,9.1): Nothing so far.


James Robertson <james@hal.utmb.edu.>

I have checked Netbulder Version 8.4 up to 10.1. None of these versions
have a backdoor that I know of. I also scanned the boot images for any
hints, none found so far.

Also, Superstack II Switch 1100, 3000, 3300 do not have the 'tech'
backdoor nor does a scan of the boot image show any hints of the same.

There is another way to gain access to a Netbuilder. All 3Com Netbuilders
support a remote command. The remote command comes with RBCS ( Remote Boot
and Configuration Services ) and Transcend Management Suite.

If you are root on a Netbuilder and know the address of someone elses
Netbuilder you can remote to their Netbuiler from yours and gain root
privelages.

Fix:
Under System Options, Limit remote access connections to a single station
or single subnet.

 SHow -SYS RemoteManager

Remote-In allowed from the following addresses: your.ip.subnet.here your.ip.addr.here
Adam Spiers <adam@thelonious.new.ox.ac.uk.> My LANplex 2500 seems vulnerable: LANplex 2500 (rev 6.20) - System ID 049bff Software version 4.3.0-7 - Built 11/10/95 03:49:46 PM The debug user id is clearly visible in an ASCII dump of the 4.3.0-20 image downloadable from ftp.3com.com.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру