exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

lingo.txt

lingo.txt
Posted Mar 15, 2005
Authored by Atom Smasher

The Lingo VoIP ATA / UTStarcom iAN-02EX device comes shipped with a default password that allows for remote administration.

tags | advisory, remote
SHA-256 | a561f82bb57b87fe982008eb03bf4c9e815190853d3b16a01d06d323a16cc24f

lingo.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

after unsuccessfully attempting to find contact information of anyone who
can address or correct this, here's a public disclosure.

Vulnerability Name
Lingo VoIP ATA / UTStarcom iAN-02EX remote access vulnerability

Overview
the UTStarcom iAN-02EX is a VoIP ATA currently being used by Lingo (and
other VoIP providers?). this advisory is specific to the configuration of
the iAN-02EX device as currently shipped by Lingo, and may or may not
apply to other configurations of the device. the default configuration
leaves the ATA vulnerable to unauthorized remote access.

Description
using the default password, a remote attacker may access the device via
the WAN port. this problem is compounded by Lingo's recommendation that
the device should be placed between a broadband modem and router
("recommended method"). this configuration makes the ATA's WAN port
accessible from the public internet.

Impact
an attacker may cause a denial of service for voice and/or data traffic.
an attacker may gain access to a customers speed-dial list and modify that
list (this may be particularly dangerous if the attacker is a scorned
ex-lover or overzealous admirer). an attacker may gain gain access to
other areas of the LAN behind the ATA (by specifying it as a DMZ or port
forwarding). an attacker may change the default password (the ATA doesn't
appear to have a customer accessible hardware reset, which could compound
a password problem). an attacker may cause other havoc for the VoIP
customer.

Solution
this vulnerability can be mitigated by not allowing login access via
WAN. at the very least this feature should be disabled by default. ideally
access via the WAN port should require that the default password is
changed.

References
https://www.utstar.com/Solutions/CPE/VoIP_CPE/
https://www.utstar.com/Solutions/Document_Library/CPE/docs/SS_UTiAN02EX.pdf
https://www.lingosupport.com/
https://www.lingosupport.com/install_multi_01.html


- --
...atom

_________________________________________
PGP key - https://atom.smasher.org/pgp.txt
762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808
-------------------------------------------------

"Your password must be at least 18770 characters and
cannot repeat any of your previous 30689 passwords.
Please type a different password. Type a password
that meets these requirements in both text boxes."
-- Microsoft takes security seriously in
Knowledge Base Article Q276304.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (FreeBSD)
Comment: What is this gibberish?
Comment: https://atom.smasher.org/links/#digital_signatures

iQEcBAEBCAAGBQJCK/Y8AAoJEAx/d+cTpVcieigH/2tclaF4CvkvQfgdOt3emrcT
XZK2a3K3gx9p1Cdy5pbXYSN+oh9EvV+LadYljASxl0IV1Kn32OZQMLJbfRTjJHf5
XaU4HIFS2n8Q/+HSVfOQCCOb1RAulD7Hpgj+/omh9kS4dHQdHJ3jBwQe9NCqF8M4
DG/H5uzB3SFuzDQemYuZOh5qnqNxUsI5TiTXAzww31tuR240sABiwGDB8eurEub3
+FWXcj9ytWMGdbk+Jq+J4MR1dDzv+pcK7cSQHUiEKtUJp0XrfyMJpgxMGxPFHWX9
T+8qM1lJw+7DNsSih6TY0OGRygVZezPpgPKZY0dDJpRvw651McQi+klWCeQU30c=
=VsqM
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close