Welcome Guest ( Log In | Register )

Bump Topic Topic Closed RSS Feed
19 Pages « < 4 5 6 7 8 > » Bottom

Outline · [ Standard ] · Linear+

Unifi WARNING TO ALL UNIFI USERS, Threat warning, read inside

views
     
DeniseLau
post May 30 2010, 10:46 PM

Casual
***
Junior Member
324 posts

Joined: Mar 2008
omg man, this is a serious fking breach of security. What's the issue with using your own router? Wouldn't it work?

Has anyone made complaints to MCMC?


p.s. Thanks riz for posting this. It's good to have a whitehat around.

This post has been edited by DeniseLau: May 30 2010, 10:47 PM
cannavaro
post May 31 2010, 06:43 AM

CATTENACIO
*******
Senior Member
3,008 posts

Joined: Sep 2005
From: T.T.D.I, Bukit Damansara


Still can't find out the other admin account. thought it was 'operator, but no cigar.
mylinear
post May 31 2010, 12:37 PM

Enthusiast
*****
Senior Member
974 posts

Joined: Jan 2009
QUOTE(rizvanrp @ May 30 2010, 08:13 PM)
I already updated the first page with a FAQ for all those "CCNP"s who are somehow still unaware of the capabilities of embedded systems in the year 2010.
*
What happens if you reset the router back to factory defaults? Will this "hidden" account remain? Will it reset the password for the account? Will the account still have remote management enabled after a reset?

TSrizvanrp
post May 31 2010, 12:43 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



Resetting doesn't work, this exploit relies on the fact that this account uses the default user/pass combo. Resetting it just resets it back to the same user/pass, remote management will be disabled however. But there's really no point anyway, the SSH daemon is still accessible via LAN.. cant stop it at all from the GUI even with this second account.
cshong
post May 31 2010, 01:09 PM

Look at all my stars!!
*******
Senior Member
3,927 posts

Joined: Oct 2007
Even though I am not UNIFI user, but according to the manual of DIR-615 downloaded from D-Link website, the default user name is 'Admin' and the default password is to leave the password field empty, means no password.

Have anyone tried resetting the DIR-615 and try login with user name 'Admin' and empty password?
TSrizvanrp
post May 31 2010, 01:12 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



QUOTE(cshong @ May 31 2010, 01:09 PM)
Even though I am not UNIFI user, but according to the manual of DIR-615 downloaded from D-Link website, the default user name is 'Admin' and the default password is to leave the password field empty, means no password.

Have anyone tried resetting the DIR-615 and try login with user name 'Admin' and empty password?
*
admin and an empty pass works on some Unifi routers with older firmware <7.05. The newer one is admin and (removed by wkkay) as the pass.

This post has been edited by wKkaY: Jun 1 2010, 04:28 PM
cshong
post May 31 2010, 01:18 PM

Look at all my stars!!
*******
Senior Member
3,927 posts

Joined: Oct 2007
QUOTE(rizvanrp @ May 31 2010, 01:12 PM)
admin and an empty pass works on some Unifi routers with older firmware <7.05. The newer one is admin and 'telekom' as the pass.
*
May be TM use customized firmware.

But, since you found the password, better change it.
skincladalien
post May 31 2010, 01:20 PM

Densha Otaku
******
Senior Member
1,914 posts

Joined: Jan 2003
From: New Selangor ^.^Y


I just had lunch with someone. Can't reveal much but look up for the Space Shuttle Challenger case study, and related it to a big Government linked company like TM...

Thats the max hint I can give.
mylinear
post May 31 2010, 01:56 PM

Enthusiast
*****
Senior Member
974 posts

Joined: Jan 2009
QUOTE(rizvanrp @ May 31 2010, 12:43 PM)
Resetting doesn't work, this exploit relies on the fact that this account uses the default user/pass combo. Resetting it just resets it back to the same user/pass, remote management will be disabled however. But there's really no point anyway, the SSH daemon is still accessible via LAN.. cant stop it at all from the GUI even with this second account.
*
At least if you reset the router, the remote management becomes disabled without you having to access the account to do it manually. Easier for basic users to do. Then the account becomes inaccessible from the outside world, right? Isn't the SSH damon also disabled by default? So without remote access to the account, you cannot enable ssh? Correct me if I am wrong please.

When you say "accessible via LAN" , are you referring to your own internal network, ie other users at home / office? Or are you referring to other Unifi users within the Unifi network?

If I understad correctly, TM should disable remote management by default. They just have to reset the router upon installation. If TM requires remote management to do troubleshooting or maintenance, when a user calls the helpline, they can be instructed on how to enable the remote management , do the necessary maintenance and then rest / disable it again.

TSrizvanrp
post May 31 2010, 02:02 PM

Getting Started
Group Icon
Elite
195 posts

Joined: Sep 2006



It's part of the Unifi installation process to enable remote management for some reason. Its disabled in a fresh reset but the technicians will enable it. Don't ask me why :S

The SSH server is always running. Even when you do a reset, its still running. The box in the 2ndary account for SSH access will be unticked, which only means the WAN (others on the internet) cannot access the SSH daemon. Other people on your LAN (192.168.0.0/24) will be able to access it fine when its not 'enabled' in the web user interface. That's why I say its still a risk to people running open Unifi hotspots at shops.
mylinear
post May 31 2010, 02:29 PM

Enthusiast
*****
Senior Member
974 posts

Joined: Jan 2009
QUOTE(skincladalien @ May 31 2010, 01:20 PM)
I just had lunch with someone. Can't reveal much but look up for the Space Shuttle Challenger case study, and related it to a big Government linked company like TM...

Thats the max hint I can give.
*
You may not want to give hints on the details, but at least hint more on the general topic you are referring to...

Guesses..

1. Is TM going to contact these forum admins and request that this and other similar topics about TM be removed or banned? Or the media has been informed not to take up this matter?

2. TM is fully aware of this but they are waiting for something to happen first, then take action or come up with excuses later?
I would think security professionals would rather be pro-active about security rather than re-active.

3 rizvanrp is going to be blown up via remote management?...??

zstan
post May 31 2010, 02:53 PM

10k Club
********
All Stars
15,856 posts

Joined: Nov 2007
From: Zion



first and foremost,

thanks rizvanrp for the post!

so what's the conclusion for all these?

don't subscribe to unifi? hmm.gif

p/s: not a tech savvy person, don't get 90% of things u guys talking. except TM can rob ur porn.
cannavaro
post May 31 2010, 03:25 PM

CATTENACIO
*******
Senior Member
3,008 posts

Joined: Sep 2005
From: T.T.D.I, Bukit Damansara


QUOTE(rizvanrp @ May 31 2010, 01:12 PM)
admin and an empty pass works on some Unifi routers with older firmware <7.05. The newer one is admin and 'telekom' as the pass.
*
Mine is version 7.05. Login is 'admin' and password is blank. Got it from the installer btw.
Ah.. so telekom is the pass for... let me try when I get home. hmm.gif
sevenBYseven
post May 31 2010, 06:29 PM

New Member
*
Newbie
0 posts

Joined: Oct 2009
QUOTE(rizvanrp @ May 31 2010, 02:02 PM)
It's part of the Unifi installation process to enable remote management for some reason. Its disabled in a fresh reset but the technicians will enable it. Don't ask me why :S

The SSH server is always running. Even when you do a reset, its still running. The box in the 2ndary account for SSH access will be unticked, which only means the WAN (others on the internet) cannot access the SSH daemon. Other people on your LAN (192.168.0.0/24) will be able to access it fine when its not 'enabled' in the web user interface. That's why I say its still a risk to people running open Unifi hotspots at shops.
*
my friend told me they enable the remote management for the FIRST level of troubleshooting purpose doing by network operation center, to "see" our router (damage or not) in case if our service down before they send their tech to cust house... hmm.gif

i still remember somebody mentioned about his router suddenly reboot just about minute after he called Unifi support center. cool2.gif

cannavaro
post May 31 2010, 07:58 PM

CATTENACIO
*******
Senior Member
3,008 posts

Joined: Sep 2005
From: T.T.D.I, Bukit Damansara


Well thank you for the hint rizvanrp. Finally got access to 'true' admin account. rclxms.gif
76radius
post May 31 2010, 08:27 PM

Getting Started
**
Junior Member
232 posts

Joined: Jan 2006


QUOTE(cannavaro @ May 31 2010, 08:58 PM)
Well thank you for the hint rizvanrp. Finally got access to 'true' admin account.  rclxms.gif
*
Yeah. Thanks to Rizvanrp & Cannavaro for the Hints. I definitely wanna make DIR615 as a "Back-up" Vlan Bridge. Hahahaha. Fun Fun Fun!!!!
silverhawk
post May 31 2010, 11:30 PM

Eyes on Target
Group Icon
Elite
4,956 posts

Joined: Jan 2003


Rizvan, good job as usual smile.gif

t3chn0m4nc3r
post Jun 1 2010, 12:07 AM

Teh Necron Lord
*******
Senior Member
4,139 posts

Joined: Sep 2006
From: Internet


allow me to say these:

1) TM staff are mostly less IT-literate than any IT personnel in other large IT MNC firms.

2) TM management are mostly completely IT-illiterate.

3) TM 2 dumb to know all this and assumes the public are no better than them.


Added on June 1, 2010, 12:20 am
QUOTE(DeniseLau @ May 30 2010, 10:46 PM)
What's the issue with using your own router? Wouldn't it work?
*

this info will be very very much appreciated if any1 have it... hmm.gif


This post has been edited by t3chn0m4nc3r: Jun 1 2010, 12:20 AM
HeHeHunter
post Jun 1 2010, 01:24 AM

On my way
****
Senior Member
664 posts

Joined: Dec 2006
QUOTE(t3chn0m4nc3r @ Jun 1 2010, 12:07 AM)
allow me to say these:

1) TM staff are mostly less IT-literate than any IT personnel in other large IT MNC firms.

2) TM management are mostly completely IT-illiterate.

3) TM 2 dumb to know all this and assumes the public are no better than them.
*
You're wrong. They are smarter than us. Or else, they would be the one working for us instead of the other way round.

Anyway, time to boot up backtrack now~
nitewish
post Jun 1 2010, 02:06 AM

Viva La Resistance
*****
Senior Member
810 posts

Joined: Feb 2008
From: 127.0.0.1



are both global account and the ssh accounts the same?

edit: never mind, i figured it out. =D

This post has been edited by nitewish: Jun 1 2010, 03:04 AM

19 Pages « < 4 5 6 7 8 > » Top
Topic ClosedOptions
 

Change to:
| Lo-Fi Version
0.0237sec    0.80    6 queries    GZIP Disabled
Time is now: 2nd December 2025 - 11:17 PM