that answer varies … they could be not acknowledging this, they could still be 
trying to figure it out …. hard to tell with vendors - some of them are great 
at dealing with this kind of stuff and some put their head in the sand ….

Also - this notice doesn’t mean 100% that it’s actually correct … this is the 
work of a security researcher typically who is making a claim.  Typically they 
are correct though …

> On Nov 12, 2016, at 7:45 AM, can...@believewireless.net 
> <p...@believewireless.net> wrote:
> 
> Why didn't Trango announce this to customers?
> 
> On Sat, Nov 12, 2016 at 7:09 AM, Paul Stewart <p...@paulstewart.org 
> <mailto:p...@paulstewart.org>> wrote:
> Yikes….
> 
> 
> 
> [+] Credits: Ian Ling
> [+] Website: iancaling.com <http://iancaling.com/>
> [+] Source: http://blog.iancaling.com/post/153011925478/ 
> <http://blog.iancaling.com/post/153011925478/>
> 
> Vendor:
> =================
> www.trangosys.com <http://www.trangosys.com/>
> 
> Products:
> ======================
> All models. Newer versions use a different password.
> 
> Vulnerability Type:
> ===================
> Default Root Account
> 
> CVE Reference:
> ==============
> N/A
> 
> Vulnerability Details:
> =====================
> 
> Trango devices all have a built-in, hidden root account, with a default 
> password that is the same across many devices and software revisions. This 
> account is accessible via ssh and grants access to the underlying embedded 
> unix OS on the device, allowing full control over it. Recent software updates 
> for some models have changed this password, but have not removed this 
> backdoor. See source above for details on how the password was found.
> 
> The particular password I found is 9 characters, all lowercase, no numbers: 
> "bakergiga"
> Their support team informed me that there is a different password on newer 
> devices.
> 
> The password I found works on the following devices:
> 
> -Apex <= 2.1.1 (latest)
> -ApexLynx < 2.0
> -ApexOrion < 2.0
> -ApexPlus <= 3.2.0 (latest)
> -Giga <= 2.6.1 (latest)
> -GigaLynx < 2.0
> -GigaOrion < 2.0
> -GigaPlus <= 3.2.3 (latest)
> -GigaPro <= 1.4.1 (latest)
> -StrataLink < 3.0
> -StrataPro - all versions?
> 
> Impact:
> The remote attacker has full control over the device, including shell access. 
> This can lead to packet sniffing and tampering, bricking the device, and use 
> in botnets.
> 
> 
> Disclosure Timeline:
> ===================================
> Vendor Notification: October 7, 2016
> Public Disclosure: November 10, 2016
> 
> Exploitation Technique:
> =======================
> Remote
> 
> Severity Level:
> ================
> Critical
> 
> 

Reply via email to