-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 KL-001-2021-004: CommScope Ruckus IoT Controller Hard-coded Web Application Administrator Password Title: CommScope Ruckus IoT Controller Hard-coded Web Application Administrator Password Advisory ID: KL-001-2021-004 Publication Date: 2021.05.26 Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2021-004.txt 1. Vulnerability Details Affected Vendor: CommScope Affected Product: Ruckus IoT Controller Affected Version: 1.7.1.0 and earlier Platform: Linux CWE Classification: CWE-259: Use of Hard-coded Password CVE ID: CVE-2021-33219 2. Vulnerability Description An undocumented, administrative-level, hard coded web application account exists in the IoT Controller OVA which cannot be changed by the customer. 3. Technical Description Ruckus vRIoT server software is available from the software library at: https://support.ruckuswireless.com/software/ Once the OVA is imported into VirtualBox, a VMDK file is created. The VMDK file can be mounted and the directory structure and its contents can be perused. The virtual appliance contains two web application accounts with passwords stored in clear text on the file system. The two accounts are 'admin' and 'nplus1user'. The 'admin' account is documented in vendor documentation, but the 'nplus1user' account is undocumented. The password for 'admin' is documented and can be changed by the user. The password for the 'nplus1user' account is 'nplus1user'. Both accounts are administrative-level accounts. The virtual appliance does not appear to offer a mechanism for changing the default password from the vendor for the 'nplus1user' account. 4. Mitigation and Remediation Recommendation The vendor has released an updated firmware (1.8.0.0) which remediates the described vulnerability. Firmware and release notes are available at: https://www.commscope.com/globalassets/digizuite/917216-faq-security-advisory-id-20210525-v1-0.pdf 5. Credit This vulnerability was discovered by Jim Becher (@jimbecher) of KoreLogic, Inc. 6. Disclosure Timeline 2021.03.30 - KoreLogic submits vulnerability details to CommScope. 2021.03.30 - CommScope acknowledges receipt and the intention to investigate. 2021.04.06 - CommScope notifies KoreLogic that this issue, along with several others reported by KoreLogic, will require more than the standard 45 business day remediation timeline. 2021.04.06 - KoreLogic agrees to extend disclosure embargo if necessary. 2021.04.30 - CommScope informs KoreLogic that remediation for this vulnerability will be available inside of the standard 45 business day timeline. Requests KoreLogic acquire CVE number for this vulnerability. 2021.05.14 - 30 business days have elapsed since the vulnerability was reported to CommScope. 2021.05.17 - CommScope notifies KoreLogic that the patched version of the firmware will be available the week of 2021.05.24. 2021.05.19 - KoreLogic requests CVE from MITRE. 2021.05.19 - MITRE issues CVE-2021-33219. 2021.05.25 - CommScope releases firmware 1.8.0.0 and associated advisory. 2021.05.26 - KoreLogic public disclosure. 7. Proof of Concept With the VMDK file mounted at the current working directory: $ more ./VRIOT/authServer/app/authapi# more __init__.py ... try: if not Account.objects.count()>0: admin_acc = Account() admin_acc.username = 'admin' admin_acc.first_name = 'Ed' admin_acc.last_name = 'Sy' admin_acc.company = 'Ruckus' admin_acc.email = 'admin@ruckuswireless.com' admin_acc.password = pbkdf2_sha256.hash('admin') admin_acc.send_notification = False admin_acc.save() with open('/var/log/auth_mongo_conn.log','a+') as f: f.write('Admin Account Created Succssfully!') admin_acc = Account() admin_acc.username = 'nplus1user' admin_acc.first_name = 'Ed' admin_acc.last_name = 'Sy' admin_acc.company = 'Ruckus' admin_acc.email = 'nplus1user@ruckuswireless.com' admin_acc.password = pbkdf2_sha256.hash('nplus1user') ... The contents of this advisory are copyright(c) 2021 KoreLogic, Inc. and are licensed under a Creative Commons Attribution Share-Alike 4.0 (United States) License: http://creativecommons.org/licenses/by-sa/4.0/ KoreLogic, Inc. is a founder-owned and operated company with a proven track record of providing security services to entities ranging from Fortune 500 to small and mid-sized companies. We are a highly skilled team of senior security consultants doing by-hand security assessments for the most important networks in the U.S. and around the world. We are also developers of various tools and resources aimed at helping the security community. https://www.korelogic.com/about-korelogic.html Our public vulnerability disclosure policy is available at: https://korelogic.com/KoreLogic-Public-Vulnerability-Disclosure-Policy.v2.3.txt -----BEGIN PGP SIGNATURE----- iQJOBAEBCAA4FiEETtzSIGy8wE6Vn0geUk0uR1lFz/MFAmCur8EaHGRpc2Nsb3N1 cmVzQGtvcmVsb2dpYy5jb20ACgkQUk0uR1lFz/PYvBAApJhuNyulnkVBixOQTNzN j1EG9LCDEZmDd3s/aqlnnK/ntsyDjLYyxr9pW9GIDRt0KvFjCkUFlXoWKifHWegz q02Y5edEFZZHQxksWqDZeItupJo64LIiff7fFdVlqTlVnLOyG+UVjrYWV2xUaZq1 uuy7hVsRc7O0cesarjF09WVs9wywf2rvnoY1qAoMQIM99gSfz16Lppvsk5umlQzy T/22t6l2Xze4JXS7TqkN28t/DRSegPOjaKMk/JxWmDoMvdSqOrwg4n7ljhg20YW+ v72EQKuBOoCQlWPGnUL9dIprybVyjn+jH5QDrd66IjefC5aH7EcOtjaxLArbsfJD co7ceFGbmytDhT1ZpMW5gl9m25k9kCpkRCUmoH17lx/AWOULBf6nC9/9STd8S7Nn m+IOFXD3d51ZJqcOx094c5EPWbXodZq+GoHXR1Z6/3oNHrs3GmAJrOAbDFg+fw6v rfIeVIO/9k1f3MmP4qgOUaKafKYAsSbWdfF25+U2g3pvgl8L30ug5nDmZIKbDWk/ ES5FG8sXDyI3dpx5tUCc8OH0qc4xXlOeDMei0i1gNf6s4MjBpmTmw1jC6w4WslTh xm6qXzkys47LJjZs0OMU6BsF/diu9LLQR08VpHxJMg8MLwTztR+XO94ooo0Nx8rW xFl8FymPMcziE7q7wFCd7O4= =qqrC -----END PGP SIGNATURE-----