Vendor description
"Korenix Technology, a Beijer group company within the Industrial Communication business area, is a global leading manufacturer providing innovative, market-oriented, value-focused Industrial Wired and Wireless Networking Solutions. With decades of experiences in the industry, we have developed various product lines [...].
Our products are mainly applied in SMART industries: Surveillance, Machine-to-Machine, Automation, Remote Monitoring, and Transportation. Worldwide customer base covers different Sales channels, including end-customers, OEMs, system integrators, and brand label partners. [...]"
Source: https://www.korenix.com/en/about/index.aspx?kind=3
Business recommendation
The vendor stated that they "will not remove the hardcoded backdoor account as it is needed for customer support and it can't be cracked in a reasonable amount of time."
SEC Consult recommends not to use those devices in production environments and to perform a thorough security review conducted by security professionals to identify and resolve potential further critical security issues.
Vulnerability overview/description
1) Backdoor Accounts (CVE-2020-12501)
Multiple different backdoor accounts were found during quick security checks of different firmware files. One backdoor account was tested on a later bought device to verify this specific finding. A telnet service is running on the device by default. This increases the risk of exploitation on the local network.
Proof of concept
1) Backdoor Accounts (CVE-2020-12501)
The following account is available on at least one JetPort device of Korenix. There might be more affected devices across this vendor. Westermo and Comtrol devices may be affected too.
* User "superrd", present on:
- JetPort 5601V3
More devices may be affected.
Two other users are present on the system according to "/etc/passwd". An additional telnet-daemon is listening on port 19999.
root:<no password>
superrd:<not cracked>
admin:admin
By inspecting "/etc/passwd", the only user that is allowed to login to the device is "superrd":
root::0:0:root:/root:/bin/false
superrd:$1$<redacted>:0:0::/root:/bin/sh
admin:$1$$CoERg7ynjYLsj2j4glJ34.:502:502::/:/bin/true
The listener has been identified by using "ps" and "netcat":
# ps
PID Uid VmSize Stat Command
1 root 1452 S init [3]
[...]
253 root 1780 S /usr/bin/ser2net -p 600 -c /tmp/com2ip.conf
254 root 288 S /usr/sbin/telnetd -p 19999
289 root 788 S /usr/bin/dropbear
297 root 1916 S /usr/bin/thttpd -C /etc/thttpd.conf -cert /etc/thttpd
# netstat -tulen
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
[...]
tcp 0 0 0.0.0.0:19999 0.0.0.0:* LISTEN
[...]
The vulnerability has been manually verified on an emulated device by using the MEDUSA scalable firmware runtime.
Vulnerable / tested versions
The following product / firmware version has been tested:
- Korenix JetPort 5601V3 / 1.0