Huawei Router Flaw Leaks Default Credential Status
#1
Quote:A vulnerability in some Huawei routers used for carrier ISP services allows cybercriminals to identify whether the devices have default credentials or not – without ever connecting to them.

CVE-2018-7900 exists in the router panel and allows credentials information to leak – so attackers can simply perform a ZoomEye or Shodan IoT search to find list of the devices having default passwords – no need for bruteforcing or running the risk of running into a generic honeypot.

“When someone has a look on the html source code of login page, few variables are declared. One of the variables contain a specific value. By monitoring this specific value, one can come to the conclusion that the device has the default password,” explained Ankit Anubhav, principal researcher at NewSky Security, in a posting on Wednesday. “The attacker can simply go to ZoomEye, find a list of devices, login, and do what they want with minimal hacking skills. As easy as that.”

Huawei has issued a fix and worked with its carrier customers to implement it across networks.

Source: https://threatpost.com/huawei-router-def...al/140234/
[-] The following 2 users say Thank You to silversurfer for this post:
  • harlan4096, wwd
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AntGROUP Inc. / VCap-developer
Ant Download Manager...jasonX — 09:21
WhatsApp Web Finally Gets Built-In Voice...
For a long time, W...harlan4096 — 08:46
AnyDesk 9.6.10 for Windows
AnyDesk 9.6.10 for...harlan4096 — 08:27
Google Chrome 145.0.7632.45/46
Google Chrome 145....harlan4096 — 08:26
UltraSearch 4.9
Version 4.9 New...harlan4096 — 08:25

[-]
Birthdays
Today's Birthdays
avatar (46)myhotseeve
avatar (46)Edwinmub
Upcoming Birthdays
avatar (38)showercurtains
avatar (49)PeterWhink
avatar (50)neuthrusBub
avatar (30)script6027529171
avatar (46)dimaWeami
avatar (39)TranoTymn
avatar (39)MezirLal
avatar (38)Michaelaburi
avatar (46)dpascoal
avatar (51)Ronaldduh
avatar (39)legalgauch
avatar (44)Baihu
avatar (27)RaseinsLikes

[-]
Online Staff
There are no staff members currently online.

>