Title:
Hard-coded ftp and shell user account password in certain Xerox ColorQube and WorkCenter devices
Timeline:
20 August 2013 - Discovery
24 August 2013 - Vendor notified
26 August 2013 - Vendor responds and starts confirmation process
30 August 2013 - Vendor acknowledges existance of issue in several product families
21 October 2013 - Vendor issues patches and XRX13_008 Xerox Security Bulletin
03 November 2013 - CVE@Mitre assigns CVE-2013-6362
Author:
Andrei Costin of "FIRMWARE.RE" project
andrei@firmware.re
andrei@andreicostin.com
Vulnerability discovered using "FIRMWARE.RE" platform/service
Security advisory numbering:
ACSA-2013-005
XRX13_008
SA55306
CVE-2013-6362
Vendor:
Xerox
http://www.xerox.com/
Product(s):
Xerox ColorCube 9201/9202/9203
Xerox WorkCenter 6400/7525/7530/7535/7545/7556/7755/7765/7775
Please see XRX13_008
Product version(s) affected:
Please see XRX13_008
CWE categories:
CWE-798: Use of Hard-coded Credentials
CWE-259: Use of Hard-coded Password
Vulnerability details:
The affected products/firmware versions contain an "internal FTP account" whose username is "intFTP".
It appears to apply at least to ColorQube 92xx series.
One particular firmware file example is "Xerox_ColorQube_upgrade_file_30823.zip/ColorQube_9201-9203_system-sw#06005000930823#.DLM".
It is intended to upgrade "ColorQube from versions 060.050.009.03614,,060.050.009.13415 or 060.050.009.24419 to version 060.050.009.30823"
The corresponding "/etc/passwd" entry of "intFTP" account is as folows:
intFTP:x:51:51:Internal FTP (cc<->nc):/:/bin/bash
The corresponding "/etc/shadow" entry of "intFTP" account is as folows:
intFTP:$1$BbR.S$t22VMWcrVUOoTPoZwMlza.:13976::::::
The account is active (it's shell is "/bin/bash" and not "/bin/false" nor "/bin/login")
The account password hash "$1$BbR.S$t22VMWcrVUOoTPoZwMlza." could not be cracked via bruteforce or known-dictionaries using tools such as "John the Ripper".
This shows that the password used is not necessarily a weak one. A security-check verifying password strength would pass this test.
However, FIRMWARE.RE automated platform could find the corresponding password hardcoded in the firmware as "t2ZG95En"
FIRMWARE.RE platform traced back the password "t2ZG95En" appearing in the files "/upgrade/upgrade_funcs" and "/upgrade/ftpHelper.sh"
As far as post-discovery manual analysis was done, the files "/upgrade/upgrade_funcs" and "/upgrade/ftpHelper.sh" are used to transfer upgrade/boot images
between CC (copy-controller?) and NC (network-controller?) components/domains of the affected devices.
FIRMWARE.RE platform suggests, inline with NIST and CWE-798 and CWE-259, not to hardcode any credentials within the devices/firmware, as well as allowing
easy change/update of such credentials in case it is really necessary by design to store them in the device/firmware.
Vendor details:
http://www.xerox.com/download/security/security-bulletin/14981-4e97ec6ba2f2e/cert_XRX13-008_v1.01.pdf
ColorQube 92xx CBC: http://www.xerox.com/downloads/usa/en/c/cert_061.050.223.04800.zip (broken!)
ColorQube 92xx SBC: http://www.xerox.com/downloads/usa/en/c/cert_061.080.223.05100.zip (broken!)
WorkCentre 6400: http://www.xerox.com/downloads/usa/en/c/cert_061.070.100.24201.zip (broken!)
WorkCentre 75xx: http://www.xerox.com/downloads/usa/en/c/cert_061.121.222.06508.zip (broken!)
WorkCentre 77xx: http://www.xerox.com/downloads/usa/en/c/cert_061.090.223.21400.zip (broken!)
About the author/project:
Firmware.RE is part of the Firmware Genome Project.
Firmware.RE is a free online service that:
- unpacks, scans and analyzes almost any firmware package and facilitates the quick detection of vulnerabilities, backdoors and all kinds of embedded malware.
- facilitates firmware mounting, modification, loading and emulation.
- facilitates firmware vulnerability and backdoor discovery.
- helps secure your embedded and internet-of-things devices.