Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Netgear patch said to leave backdoor problem in router

Lucian Constantin | April 25, 2014
The security researcher who identified an admin backdoor in a range of routers last year has found that Netgear's patches don't adequately address the security issue.

The security researcher who identified an admin backdoor in a range of routers last year has found that Netgear's patches don't adequately address the security issue.

In December, Eloi Vanderbeken discovered that he could get a remote root shell on his Linksys WAG200G router without authenticating when connecting to the device over TCP port 32764. The same backdoor feature was later confirmed in 24 router models sold under the Netgear, Cisco Systems, Linksys (now owned by Belkin) and Diamond brands and it was believed to have its origins in firmware code developed by Sercomm, a Taiwan-based manufacturer of wireless and broadband equipment that serves as hardware partner for multiple networking vendors.

Vanderbeken, a researcher at Paris-based IT security firm Synacktiv, recently downloaded and analyzed a firmware update released by Netgear for its DGN1000 Wireless router and DSL modem that was supposed to have fixed the issue. He found that the backdoor is no longer directly accessible over port 32764 TCP, but that it can be reactivated by sending raw Ethernet packets to the device with protocol type 0x8888 and the MD5 signature of the router model (DGN1000) as the payload.

"The 0x8888 ethertype and packet structure is used in an old Sercomm update tool," the researcher said in a report of his findings.

Once the device receives such a packet, the backdoor is reactivated and starts listening on port 32764 again, Vanderbeken said Tuesday via email.

The vulnerability is now harder to exploit because an attacker can only send the required raw packets from the same local area network as the targeted device or from one hop away, like its ISP. However, the backdoor is essentially still there, according to the researcher.

This mechanism involving specifically crafted raw Ethernet packets does not exist in the older firmware, he said. "It was added on purpose, to reactivate the backdoor. This is 100 percent intentional."

In addition to giving attackers the ability to execute commands with root access — the highest privilege on Linux systems — the backdoor also allows flashing the router LEDs by sending special messages to the device.

"I don't know if it was Netgear, Sercomm or both who decided to keep the backdoor open but it is deliberate," the researcher said. "I don't know why. There is no legitimate reason to do so."

There is a physical button that can be used to reset the router to factory defaults if needed in technical support cases and the setup wizard doesn't require the backdoor for remote configuration either, Vanderbeken said. "It's used internally by some services to update the configuration but it is never used from outside the router. There is no reason to keep it open."

 

1  2  Next Page 

Sign up for CIO Asia eNewsletters.