Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security

Netgear's Amusing "fix" for WG602v1 Backdoor 515

An anonymous reader writes "Recently Slashdot reported that the Netgear router has as WLAN backdoor. According to this report by the news service of the German publisher Heise Netgear "fixed" the problem with a firmware update. And what is the fix? According to Heise, they didn't remove the backdoor at all. Instead they just changed the login information! They replaced the old user name 'super' with 'superman', and changed the old password to '21241036'. "
This discussion has been archived. No new comments can be posted.

Netgear's Amusing "fix" for WG602v1 Backdoor

Comments Filter:
  • Not funny at all (Score:5, Interesting)

    by Ckwop ( 707653 ) * on Tuesday June 08, 2004 @10:42AM (#9365889) Homepage
    I don't think there's anything amusing about this at all. I think the owners of these units should file a class action lawsuit, though i'm not even sure that's possible due to the EULA. If the EULA does get in the way then
    I think it's time the government steped in to protect the consumer and started making companies liable for acts as stupid as this. This just isn't the way a responsible company behaves.

    Simon.
  • Bianry Edit (Score:5, Interesting)

    by HogGeek ( 456673 ) on Tuesday June 08, 2004 @10:44AM (#9365914)
    I'm wondering if one could use something like bvi [sourceforge.net] to change the username and password to something private.

    I've done it with other types of binary files, but never tried with firmware.

    Anyone try this?

  • Reputation damage (Score:4, Interesting)

    by SamiousHaze ( 212418 ) on Tuesday June 08, 2004 @10:44AM (#9365919)
    I am so irritated I don't know what to say. Seriously, How can netgear expect people to trust them again, is there any way to repair their reputation?
  • by Anonymous Coward on Tuesday June 08, 2004 @10:45AM (#9365951)
    The blackhats that subscribe to

    http://lists.netsys.com/mailman/listinfo/full-di sc losure

    knew about this on irc for a while.

    EU via interpol desires, and us's NSA/NRO both desire various entrypoints.

    cisco's fiascos may be a trend. This netgear is only the tip of the iceberg I bet.

  • Who reads slashdot? (Score:5, Interesting)

    by tony_gardner ( 533494 ) on Tuesday June 08, 2004 @10:52AM (#9366035) Homepage
    I realise that this is a bit redundant, but I read the slashdot artile linked to, and what to I see but:

    Re:Fixed in new firmware, available here: (Score:3, Informative)
    by Chucky B. Bear (785810) on Saturday June 05, @03:10PM (#9345433)
    I've just upgraded to the latest firmware. It is NOT FIXED!!!! They have simply gone and changed the username and password to something else. There is STILL a default superuser account with password.

    (You can find it yourselve by just taking similiar steps as in the securityfoces article.)


    Maybe reading slashdot sometimes would be a good idea.
  • Re:Bianry[sic] Edit (Score:3, Interesting)

    by phaze3000 ( 204500 ) on Tuesday June 08, 2004 @10:57AM (#9366103) Homepage
    The firmware is gzip compressed, so you'd need to do a bit more than just use bvi. But I suspect if you extracted the gzip'd portion, edited the firmware, re-gzipped it, put it back in the firmware and updated any crc/md5 checks in there it might work.
  • Supermaning it.... (Score:5, Interesting)

    by utlemming ( 654269 ) on Tuesday June 08, 2004 @10:58AM (#9366119) Homepage
    I am amused. When I say the headline I just about died laughing. The sad part is that most people that have a Netgear router aren't going to update the firmware, and they probably don't even care or understand the issues involved. Further, what about all those units that are on the shelf somewhere? The problem is that Netgear has admitted now that they are not interested in security and they are not offering a secured unit. I was amused when I installed one for a friend -- she had bought the unit. No user name, just a password. I am thinking that IEEE or ANSI or whoever should adopt a standard for baseline security for routers. That way even an idiot that wants to have an open WIFI device won't have to worry about some Wardriver taking over his device. Well, all I can say is that I am happy that I was not the executive that made the Superman call.
  • Sound familiar? (Score:4, Interesting)

    by merlin_jim ( 302773 ) <.James.McCracken. .at. .stratapult.com.> on Tuesday June 08, 2004 @11:02AM (#9366161)
    Was anyone else reminded of some of Mitnick's work where he'd call the manufacturer of the equipment to get the backdoor password? That most of the people using it didn't even know it had? And they gave it to him over the phone...
  • Re:Oops... (Score:5, Interesting)

    by div_2n ( 525075 ) on Tuesday June 08, 2004 @11:03AM (#9366180)
    My experience with Netgear products has led me to believe their quality has diminished dramatically.

    IANAL, but I seem to recall a lawyer I know telling me that with product liability, a company is liable if due diligence is not performed to fix an issue when a known problem exists. Of course, the trick becomes can you call changing a username and password due diligence? I feel certain every computer expert in the world would say no.
  • Re:Oops... (Score:5, Interesting)

    by Twirlip of the Mists ( 615030 ) <twirlipofthemists@yahoo.com> on Tuesday June 08, 2004 @11:06AM (#9366223)
    Why on EARTH is this not literally considered a criminal offense for a company to do?

    Just how many criminal laws do you think we need? Seriously. Do you think we need another one?

    There's no doubt in my mind that the vendor would be held liable for damages if anybody were harmed--financially I mean--by this kind of thing. But should somebody really go to jail over it?

    Geez. And I thought I was a fascist.
  • by straponego ( 521991 ) on Tuesday June 08, 2004 @11:09AM (#9366256)
    By issuing this form of a fix, Netgear is stating that they are not just incompetent, they are deliberately so, and they think everybody else is as stupid as they are. I've rarely seen such negligence and contempt for customers. Well, not that rarely: The Winnuke Patch [unixgeeks.org]
  • Secure Backdoors (Score:4, Interesting)

    by DreadSpoon ( 653424 ) on Tuesday June 08, 2004 @11:13AM (#9366315) Journal
    Now, I'm not going to even start discussing whether the product *should* have a backdoor. There are many reasons for including them, and many obvious reasons to not.

    What I want to know is, why bother with user names and passwords in the backdoor? An SSH tunnel using only public key authentication would pretty much solve the problem of someone examining the firmware for the login information. You could also include multiple keys and provide a public key revokation server that the units automatically update from, as well as a general key update server that the units will grab new keys from using a callback mechanism (to guarantee that the key update servers have a valid private key for connecting to the unit).
  • by spellraiser ( 764337 ) on Tuesday June 08, 2004 @11:17AM (#9366372) Journal

    Ok, everyone read the following carefully:

    The parent of this comment is a troll. It contains the spurious phrase: 'Michael Sims reports a large opening in his backdoor for all to use', which is certainly not in the original article.

    Got that? Read the parent, see the line (it is the second to last line in the parent). Did you mod that comment as Informative? Then you should be ashamed of yourself.

    Why do people mod comments if they haven't read them? Seems like a very perversive kind of logic indeed.

  • by netringer ( 319831 ) <.maaddr-slashdot. .at. .yahoo.com.> on Tuesday June 08, 2004 @11:20AM (#9366417) Journal
    Doesn't having the username and password in the clear mean that anybody who knows how to use a Hex editor can make their own patch? Just find those two strings and change them to something else, or better some sequence of bits that don't map to text.

    Is there a checksum or CRC check in the firmware loader on the router that keeps you from being able to do that?
  • Re:Are there others? (Score:3, Interesting)

    by nolife ( 233813 ) on Tuesday June 08, 2004 @11:21AM (#9366432) Homepage Journal
    I don't know either but you could try the existing known accounts for yourself on your own router. This won't help if a backdoor is there with different credentials but provide piece of mind that the two well known ones either do or do not work.
    Getting off topic here but the main advantage of full disclosure with bugs and similar issues like this is you have the ability to verify and test for yourself. Sure beats getting an email that a patch is available and you have no idea what it fixed or how it fixed it.
  • by $ASANY ( 705279 ) on Tuesday June 08, 2004 @11:22AM (#9366448) Homepage
    I tried it on my WG602 with firmware revision 1.5.67, and this username/password doesn't work. Neither did the first combination provided.

    Now maybe there are some firmware versions out there that have these vulnerabilities, but I haven't been able to confirm either report and am beginning to wonder whether any of these stories are true. Of course, my standard practice of getting the latest firmware when I buy some equipment may have shielded me from these problems, and there are probably plenty (fools?) out there that don't do this and may have opened themselves up. But to see two vulnerability reports I cannot confirm makes me wonder whether this is some sort of disinformation campaign.

    I look at the comments on this thread and am amazed that the supposedly technically competent can rush to judgement so quickly and with so little evidence. Were this to hit the mainstream media, can you imagine how this could change the marketplace, even if the report isn't true?

    Maybe I should be buying some Cisco stock...

  • by Secrity ( 742221 ) on Tuesday June 08, 2004 @11:22AM (#9366454)
    How can you be sure that the backdoor ID to your gear isn't batman and that the passward isn't 46386124? I realize that any proprietary software can have backdor passwords in it. Netgear has shown that at least one of their products has a backdoor. When Netgear was given the chance to act horrified that somebody put a backdoor in one of their products and remove it, they decided to just change the backdoor name and password. This gives me LOTS of confidence in the security awareness of Netwgear products. You are trusting the security of your wireless connectivity to a company that knowingly maintains a backdoor in at least one of it's products.
  • Re:Oops... (Score:2, Interesting)

    by isthisthingon ( 785412 ) on Tuesday June 08, 2004 @11:23AM (#9366464) Homepage
    Good point. It is the fact that something is by most anyone's notion "unfixable" by the average end user to protect themselves that makes it so disagreeable in our eyes. It seems a bit like a car company recalling cars because of faulty parts then replacing those faulty parts with other faulty parts.

    As consumers we can, and do, put our money where our mouths are. Fine indeed. At what point though are companies really held accountable? Much later to their shareholders for dropped profits? No one will ever tie the two events together.

    I agree it may be a bit over the top to say criminal offense, but at some point, at some point, this type of product negligence really is just that.
  • by Chucky B. Bear ( 785810 ) on Tuesday June 08, 2004 @11:25AM (#9366495)
    Yeah I hate to say it but told you so!!! ;-) I posted that just before the securityfocus mail. Its funny how this all ended up as a Heise article now. They could've at least given me some credit for finding it.

    I did talk to a netgear support engineer yesterday and he didn't know what I was talking about, so now I'm still waiting to hear anything back from them.

  • Re:Bianry Edit (Score:5, Interesting)

    by MrBlue VT ( 245806 ) on Tuesday June 08, 2004 @11:44AM (#9366697) Homepage
    I have an earlier Netgear product (RT314). It's actually a rebranded Zytel product, so this trick may not work on other models.

    However, it was possible to edit the firmware in a binary editor. There was a checksum in the firmware, but you could fix it. You needed to connect a serial cable to the management port. When you made a change and uploaded the new firmware to the router and rebooted, the router would helpfully tell you what the old checksum was and what it expected the new checksum to be. You could then just search for the old checksum string and replace it with the new one the router calculated for you.

    Pretty easy to do. And allowed you to run some of the newer Zytel firmware on the Netgear boxes.
  • by funkdid ( 780888 ) on Tuesday June 08, 2004 @11:48AM (#9366737)
    Over the weekend I purchased a Linksys wireless G "router" for my sis and brother-in-law and searched for an updated firmware. I was surprised to not find one. The last Linksys firmware is 2.02.7 from 3/17/2004. I would have bet money that Linksys would have a fix before Netgear did, especialy with Cisco being the parent company. At least Netgear made a shoddy attempt to fix their problem.
  • Re:Oops... (Score:4, Interesting)

    by stienman ( 51024 ) <adavis&ubasics,com> on Tuesday June 08, 2004 @11:52AM (#9366804) Homepage Journal
    The interesting thing about liability is that if they have some control over your routers, then you can hold them more liable than if they had no control. Further, now that everyone knows they can 'dial in' then hopefully customers will pester them to fix their products remotely instead of spending hours on the phone. In the end a backdoor is *much* more work than a product without one.

    Silly programmer, backdoors are for script kiddies.

    -Adam
  • Re:Oops... (Score:5, Interesting)

    by arivanov ( 12034 ) on Tuesday June 08, 2004 @12:04PM (#9366983) Homepage
    I do.

    In fact I drove all possible candidates for several days before I bought what I have now. It is quite easy. Every time you go on a holiday rent one of the candidates for "next thing to buy". You get to see it in all of its "glory" - lowest spec, run down by tourists and badly maintained. If it is still OK you go and buy it. You may suffer some minor discomfort compared to renting "the old familiar", but you save a lot of money :-)

    I also do the same stuff with computer equipment. Buy, test drive if it is shit - return. It is quite easy to do it in EU due to distance selling regulations. You are entitled to a free return no questions asked of anything you have bought over phone or Internet within 1 week after purchase. This limits you to internt purchases, but once you add this along with observations of company kit you are reasonably well positioned to get the right stuff...
  • by OmniGeek ( 72743 ) on Tuesday June 08, 2004 @12:09PM (#9367037)
    The firmware for this box (or at least some of it) is offered for download on Netgear's site. I'm looking through the source, but I haven't seen anything relevant yet.

    Has anyone seen where the backdoor is coded into the system? (Hint: if it's NOT in the source anywhere, Netgear is violating GPL here).
  • FVS318 (Score:3, Interesting)

    by Dalroth ( 85450 ) * on Tuesday June 08, 2004 @12:17PM (#9367145) Homepage Journal
    Man this sucks. I've got an FVS318. While, thankfully it's not the router that is the cause of this particular ruckus, it's a Netgear product.

    I like it. It's a very solid, reliable firewall/router. I've had it for a number of years now, and Netgear to this day continues to put out new firmware updates that not only fix bugs, but implement new features. It works well, and I always liked it better than my friend's Linksys.

    But this whole crisis makes me really really leary... How do I know there isn't a backdoor in my firewall/router as well? The fact is, now I don't.

    Getting a Linksys that can run a custom Linux distribution becomes more appealing every single day. This may be what finally pushes me over the edge.

    Bryan
  • Re:No harm, no foul (Score:3, Interesting)

    by gfxguy ( 98788 ) on Tuesday June 08, 2004 @12:22PM (#9367192)
    Not as far as I know, but if I were a business I wouldn't have to have actual damages from an attacker to claim that I had to take my computers offline while the security risk was fixed, therefore costing my business an estimated $X.
  • 40136 RingBack (Score:1, Interesting)

    by Anonymous Coward on Tuesday June 08, 2004 @12:29PM (#9367272)
    Seems to me that 41036, along with 41091 and a few othewr 5 digit strings beginning with 41 were once relegated to local loop testing. IIRC dialing 40136 then hanging up, would give you a natural ring, just like a real incomming phone call. 40191 would give short and long rings. This was many years ago in the early 70' and in a Canadian area code.

    Can anyone else confirm my rememberances?

  • Re:Why post this? (Score:3, Interesting)

    by Fjord ( 99230 ) on Tuesday June 08, 2004 @12:35PM (#9367332) Homepage Journal
    Really, isn't there something slightly immoral, possibly illegal about putting a backdoor into your product that allows anyone access to it, with no way to disable it, and THEN, when you are caught, you blame "the vendor that packaged the device for" you, and THEN you release a patch that claims to fix the backdoor, but really just leaves it there with a different password?
  • by jdew ( 644405 ) on Tuesday June 08, 2004 @12:40PM (#9367408)
    I recently bought several 24 port switches off of ebay. There was no way to reset the password, but calling up tech support, and providing a small amount of proof that I did in fact buy these switches, they provided me with the backdoor username/password.

    It's documented on their website that they do have a backdoor password, and what you need to do to get it. For me, it took a single email (ebay end of auction), and a 5 minute phone call to get the backdoor.

    This would be fine, if the backdoor only worked on the serial console, but nope.. Works fine with the web interface too :(
  • Re:Oops... (Score:3, Interesting)

    by TyrranzzX ( 617713 ) on Tuesday June 08, 2004 @01:00PM (#9367680) Journal
    Agreed. I like to use the pair of pants example. I can pick up a pair of pants and see what it's made of; the quality of the stiching, weither it's double or triple stiched, the quality of the fabric, dye, etc. Even with military camo, you've got different patterns, different fabrics and synthetics, etc.

    When I go down to the military surplus store, I can refuse to buy clothing wrapped in boxes and bags, because I don't get to see them. Instead, I go to the shelves and take a good look at what's on the shelf.

    When I head down to the store to pick up a router, however, I'm only told which standards it's complaint with, not what it's capable of doing. I can't see the soldering, the capacitor branding, the capacitor capacitance tolerance and what range that tolerance is in. I can't take a look at the source to know weither or not someone can get in.

    Inotherwords, all the pants in the military surplus store are in boxes I can't, by law, open up. I can use the pants, I just can't inspect them for flaws. I can see the box is labeled "surplus military pants 30/70, Chocolate chip camo pattern" but I can't open up the box to see.

    CEO's just don't care; they want to maximise the profit to their investor, and to do that, they've got to crank out a whole lot of shitty product and sell it super expensive.
  • Re:Oops... (Score:1, Interesting)

    by Anonymous Coward on Tuesday June 08, 2004 @01:05PM (#9367729)
    Because it's trivial for the average linux user to debug the original router application, which may or may not come with source code, fix it, cross-compile onto a RISC arch, etc, ...
  • by Animats ( 122034 ) on Tuesday June 08, 2004 @01:13PM (#9367821) Homepage
    Someday, somebody from Netgear is going to have to explain that to a judge and jury. And it's not going to go over well. Once might be considered ordinary negligence. But the second time moves it into the "gross negligence" category: "an act or omission in reckless disregard of the consequences affecting the life or property of another."
  • by Holi ( 250190 ) on Tuesday June 08, 2004 @01:33PM (#9368046)
    I would think under current laws that installing an undisclosed backdoor onto someone elses property would be akin to using a trojan to allow access to anothers system. Just becaujse they sell the system does not give them the right to access to it after it is sold. I can see no beneficial reason for this as most consumer routers have a hardware reset that reloads the factory defaults.
  • Re:Oops... (Score:3, Interesting)

    by Fjord ( 99230 ) on Tuesday June 08, 2004 @01:40PM (#9368139) Homepage Journal
    Yeah, I don't think people got it. 70% informative my ass. FWIW, this [pimpz.org] is the source I used. I don't have the rules of fight club memorized.

    I would have swore the first two lines and the last line would have given it away tho.
  • Re:Oops... (Score:4, Interesting)

    by DaveJay ( 133437 ) on Tuesday June 08, 2004 @01:53PM (#9368288)
    I did the same thing. Was going to buy a specific car, and my wife and I loved it during the test drive -- so we rented one for a week's road trip. By the end of the first day, we HATED it, and couldn't wait to return it.

    We then rented the car we ultimately bought, and it's been so good to us, she's still got the first one, I bought a second one, and I have since traded it in for a high-performance version of the same. Whee!

    And no, I'm not going to tell you the cars, but I'll give you a hint: the one we hated rhymes with bored locus, and the one we love (sort of) rhymes with grease-on ben-tra. Hard to rhyme with car names that are invented words. Heh.
  • Hm (Score:4, Interesting)

    by David_Bloom ( 578245 ) <slashdot@3lesson.org> on Tuesday June 08, 2004 @06:21PM (#9371316) Homepage
    If you owned one of these routers, could you figure out where those strings are then just type in random letters of gobbleygook that are the same lengths, and use it on your own router (not distribute it, because then you'd be giving the pass away :))?

    Maybe somebody could make a program where:

    1. User opens program
    2. User points program to firmware file
    3. Program opens firmware file and replaces the hardcoded passwords with gobbleygook that is different each time the program is run
    4. Program writes new firmware to disk
    5. User reflashes router with firmware patched by program
    This seems like a good potential short-term solution to me...
  • Re:Not funny at all (Score:3, Interesting)

    by Eivind ( 15695 ) <eivindorama@gmail.com> on Wednesday June 09, 2004 @02:21AM (#9374560) Homepage
    Not really.

    A license gives you the rigth to do something that would be, in the absence said license, illegal.

    For example, you can get a concealed weapons license, which will make it legal for you to do something that would otherwise be illegae -- carry a concealed weapon in public.

    Similarily, the GPL is a license -- it gives you the rigth to do certain things that would be illegal without a license, such as redistributing the software in original or altered form.

    Most EULAs are not licenses. They do not let you do anything that would be illegal without one. Instead they typically attempt to do the reverse; they attempt to prevent you from stuff that are perfectly legal by default, such as for example reselling your property, publishing a test of a product you've purchased, or even using the product for producing a report critical of the producer.

    That makes it different. If I want to give you permission for something that would otherwise be illegal, say I want to give you permission to enter my house, I can just do so. One-sided. There's no requirement for you to agree. If I demand something in return, like the GPL does, and say: "you may enter my house at will, provided you put a dollar in this box, and wear orange underpants." you're still not required to agree, though if you don't agree, then entering is unlawful.

    EULAs are different. They typically don't offer you anything. And no, the "rigth to use software" doesn't fall in this category, because it's the *default* that you're allowed to use software that you legally bougth. (what a concept !)

    The producers typically *claim* that they are not selling you one copy of the software, but rather they're selling you a license to the software. However this claim is pretty dubious. Anyone can go into a shop and say: "I would like to purchase a copy of Microsoft Office". They'll take your money, and hand over a copy of Microsoft Office. A reasonable person would then assume that he had, indeed, bougth one copy of Microsoft Office. It's not very likely that some text inside the box, or even worse, displayed as part of some installation-routine uniliterally can change this.

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...