[NEWS] ATA-186 Password Disclosure Vulnerability

From: support@securiteam.com
Date: 05/26/02

From: support@securiteam.com
To: list@securiteam.com
Date: Sun, 26 May 2002 08:47:41 +0200 (CEST)

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

When was the last time you checked your server's security?
How about a monthly report?
http://www.AutomatedScanning.com - Know that you're safe.
- - - - - - - - -

  ATA-186 Password Disclosure Vulnerability


The Cisco ATA 186 Analog Telephone Adaptor is a handset-to-Ethernet
adaptor that interfaces regular analog telephones with IP-based telephony
networks. The adaptor turns traditional telephones into IP telephones.

The ATA-186 is provided with a web-based configuration interface whose
authentication is trivially circumvented. Using a crafted HTTP POST
request the configuration of the device will be returned to the browser
revealing configuration information such as passwords.

This advisory is an addendum for article:
 <http://www.securiteam.com/securitynews/5PP0G0K75U.html> Cisco ATA-186
Admin Password Can be Trivially Circumvented


Affected Products:
The affected product is the Cisco ATA-186 analog telephone adapter. All
releases before build 020514a are affected.

No other Cisco product is currently known to be affected by this

A simple crafted HTTP POST request may cause the ATA-186 to display its
configuration screen. Since the device does not hash its password, the
actual password can be gleaned from this screen. The device can also be
reconfigured in this way by constructing an HTTP POST with the appropriate

By exploiting this vulnerability, an attacker can compromise the integrity
of the ATA-186.

Software Versions and Fixes:
Version Affected - Fixed Regular Release (available now), Fix carries
forward into all later versions
Prior to build 020514a - ata186-v2-14-020514a-2.zip (H.323/SIP image),
ata186-v2-14-ms-020514a-2.zip (SCCP/MGCP image)

Obtaining Fixed Software:
Cisco is offering free software upgrades to address this vulnerability for
all affected customers. Customers may only install and expect support for
the feature sets they have purchased.

Customers with service contracts should contact their regular update
channels to obtain any software release containing the feature sets they
have purchased. For most customers with service contracts, this means that
upgrades should be obtained through the Software Center on Cisco's
Worldwide Web site at <http://www.cisco.com/> http://www.cisco.com/.

Customers whose Cisco products are provided or maintained through a prior
or existing agreement with third-party support organizations such as Cisco
Partners, authorized resellers, or service providers should contact that
support organization for assistance with obtaining the free software

Customers who purchased directly from Cisco but who do not hold a Cisco
service contract, and customers who purchase through third party vendors
but are unsuccessful at obtaining fixed software through their point of
sale, should obtain fixed software by contacting the Cisco Technical
Assistance Center (TAC) using the contact information listed below. In
these cases, customers are entitled to obtain an upgrade to a later
version of the same release or as indicated by the applicable row in the
Software Versions and Fixes table (noted above).

Cisco TAC contacts are as follows:
 * +1 800 553 2447 (toll free from within North America)
 * +1 408 526 7209 (toll call from anywhere in the world)
 * e-mail: tac@cisco.com

See <http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml>
http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml for additional
TAC contact information, including special localized telephone numbers and
instructions and e-mail addresses for use in various languages.

Please have your product serial number available and give the URL of this
notice as evidence of your entitlement to a free upgrade.

Please do not contact either "psirt@cisco.com" or
"security-alert@cisco.com" for software upgrades.

There is no known workaround. A software upgrade is necessary.


The information has been provided by <mailto:psirt@cisco.com> Cisco
Systems Product Security Incident Response Team.


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

Relevant Pages