Trustwave's SpiderLabs Security Advisory TWSL2010-008:
Clear iSpot/Clearspot CSRF Vulnerabilities
https://www.trustwave.com/spiderlabs/advisories/TWSL2010-008.txt
Published: 2010-12-10 Version: 1.0
Vendor: Clear (http://www.clear.com)
Products: iSpot / ClearSpot 4G (http://www.clear.com/devices)
Versions affected:
The observed behavior the result of a design choice, and may be present
on multiple versions. The specific versions used during testing are
given below.
iSpot version: 2.0.0.0 [R1679 (Jul 6 2010 17:57:37)]
Clearspot versions: 2.0.0.0 [R1512 (May 31 2010 18:57:09)]
2.0.0.0 [R1786 (Aug 4 2010 20:09:06)]
Firmware Version : 1.9.9.4
Hardware Version : R051.2
Device Name : IMW-C615W
Device Manufacturer : INFOMARK (http://infomark.co.kr)
Product Description:
iSpot and ClearSpot 4G are portable 4G devices, that allow users to share
and broadcast their own personal WiFi network. The device connects up to 8
clients at the same time, on the same 4G connection.
Credit: Matthew Jakubowski of Trustwave's SpiderLabs
CVE: CVE-2010-4507
Finding:
These devices are susceptible to Cross-Site Request Forgery (CSRF).
An attacker that is able to coerce a ClearSpot / iSpot user into
following a link can arbitrarily execute system commands on the device.
The following examples will allow an attacker to enable remote access to the
iSpot and ClearSpot 4G, and add their own account to the device. This level
of access also provides a device's client-side SSL certificates, which are
used to perform device authentication. This could lead to a compromise of
ClearWire accounts as well as other personal information.
Add new user:
or
Remove root password:
or
Enable remote administration access:
or
Enable telnet if not already enabled:
or
Allow remote telnet access:
or
Once compromised, it is possible to download any file from the devices using
the following method.
Download /etc/passwd file:
or
Vendor Response:
No official response is available at the time of release.
Remediation Steps:
No patch currently exists for this issue. To limit exposure,
network access to these devices should be limited to authorized
personnel through the use of Access Control Lists and proper
network segmentation.
Vendor Communication Timeline:
8/26/10 - Vendor contact initiated.
9/30/10 - Vulnerability details provided to vendor.
12/3/10 - Notified vendor of release date. No workaround or patch provided.
12/10/10 - Advisory published.
Revision History:
1.0 Initial publication
About Trustwave:
Trustwave is the leading provider of on-demand and subscription-based
information security and payment card industry compliance management solutions
to businesses and government entities throughout the world. For organizations
faced with today's challenging data security and compliance environment,
Trustwave provides a unique approach with comprehensive solutions that include
its flagship TrustKeeper compliance management software and other proprietary
security solutions. Trustwave has helped thousands of organizations--ranging
from Fortune 500 businesses and large financial institutions to small and
medium-sized retailers--manage compliance and secure their network
infrastructure, data communications and critical information assets. Trustwave
is headquartered in Chicago with offices throughout North America, South
America, Europe, Africa, China and Australia. For more information, visit
https://www.trustwave.com
About Trustwave's SpiderLabs:
SpiderLabs is the advance security team at Trustwave responsible for incident
response and forensics, ethical hacking and application security tests for
Trustwave's clients. SpiderLabs has responded to hundreds of security incidents,
performed thousands of ethical hacking exercises and tested the security of
hundreds of business applications for Fortune 500 organizations. For more
information visit https://www.trustwave.com/spiderlabs
Disclaimer:
The information provided in this advisory is provided "as is" without warranty
of any kind. Trustwave disclaims all warranties, either express or implied,
including the warranties of merchantability and fitness for a particular
purpose. In no event shall Trustwave or its suppliers be liable for any damages
whatsoever including direct, indirect, incidental, consequential, loss of
business profits or special damages, even if Trustwave or its suppliers have
been advised of the possibility of such damages. Some states do not allow the
exclusion or limitation of liability for consequential or incidental damages so
the foregoing limitation may not apply.