Skip to main content

Alcatel ASDL modems possibly under attack - firmware changed by parties unknow

posted onAugust 5, 2001
by hitbsecnews

Andrea Costantino is reporting that there seems to be an attack in progress against all Alcatel ASDL modem/router users. Using the EXPERT mode vulnerability and the Shimomura's challenge/response EXPERT mode password calculator, someone has upgraded the firmware of all Alcatel modem in Italy and maybe elsewhere.

It seems that a particular version is being installed by someone on the Alcatel after a portscan to detect it. I've recorded a large portscan against port 21 (the one used to upgrade the new version) to ALL my public IP, and all IPs of my ISP. It seems that the intruder scanned with a SYN/FIN portscan to detect the Alcatel and after he/she put the new firmware version.

I don't know what the hell the new version does, but sometimes during the upgrade the configuration is lost, so many people blame their ISP or the telco company for service interruptions, but in truth their ADSL is running flawlessy, while the modem has became unconfigured. I suspect that the new version has some kind of backdoors, since the EXPERT mode is disabled in telnet (while the debugging stuff still works with the same challenge/response schema), but the normal user is allowed to do ftp get (while it wasn't allowed to before, thanks Luca), and some features seems to appear (the debugging stuff I reported before, td menus).....

From: Andrea Costantino

Hi world of coder,

My modem was upgraded apparently during the period between the 0:00 and
the 4:00 CET of the 3rd of August without loosing any configuration, so
I would't notice anything without a direct check using "software version"
on console or telnet access.

The offending version was:
KHDSAA3.264 with md5 6771623a99d774953d6469ba6f2ccacb

How to downgrade?
First of all, obtain a clean version, with or without Shimonmura's patch
(as you wish). I can't send it on a mailing list for copyright reasons
(really sorry!!!!!!),

The two official versions I saw BEFORE the attack were (trained by their
md5sums):

ae93eedcc6bee9d3c24ba6d0f809784e KHDSAA.134
or
5582c3922a2faae789674b6e0ced7e78 KHDSAA.132

Then put it by ftp on your modem. Just remember to put it (in binary mode,
issue bin command first of all) in the dl directory and exec "quote site gc"
just before the put command.
Now telnet or grab put your favourite console cable (if you have the Pro
version, of course) to your modem, then login (if needed..) and issue

=> software setpassive file = KHDSAA.13x

(put your own version, sub the x with 2 or 4 or whatever..)

=> software switch

the modem reboots
reconnect as fast as you can if you are connected by telnet..

=> software version
just to check if it's running the right version (check the active one!)

=> software deletepassive
delete the 264 one before the modem detects it and reboot with this (it
thinks that the 264 is newer, so it tries to run the latest one..).
if you are unable to delete the new one, try the more powerful console
access if you've a Pro version.

If you apply the patches, remember to disable EVERYTHING (apart from
telnet/ftp access, otherwise you won't be able to download any newer
release). No EXPERT access, no TFTP, no VPI 15 AAL5 TFTP/SNMP access =
less troubles in future.

Remember also that many other backdoors can still exist, since many people
running patched versions get their modem upgraded without notice..

Many thanks to Luca "Bluca" Berra and Michele "BaNzO" Zamboni for their
unvaluable help while thinking and patching everything!

Many "thanks" even to Alcatel people for providing backdoor'd sw and
avoiding public distribution of patches. I hope this incident will
convince them to be more "open" to coder/hacker community, since security
through obscurity is NOT a good way of life, as Windows teach.

Otherwise I wish them to live the hell of many many people calling them to
ask for patches.. :)

Baciamo le mani,
k0

SNP.

Source

Tags

Networking

You May Also Like

Recent News

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Friday, June 7th

Thursday, June 6th

Wednesday, June 5th