News Start Security Advisory-SNMP vulnerability on Huawei multiple products SA No: Huawei-SA-20121025-01 Release Date: 2012-11-13 summary In some of Huawei products as affected products list below, there are MIBs which support the query of the local user account and password. However, the security authentication protection for SNMP V1 and V2 is not enough, which leads to the risk that the user account and password can be disclosed through SNMP. (HWNSIRT-2012-1017) Affected Products Router series products NE5000E MA5200G NE40E&80E V300R007 V800R002, V800R003 V200R003 V300R003 V300R003 V600R001, V600R002, V600R003 ATN V200R001C00, V200R001C01 NE40&80 V300R005 NE20E-X6 V600R003 NE20 V200R005 V100R005, V100R006 ME60 V600R002, V600R003, V600R005C00SPC600 CX600 CX200&CX300 V200R002 V600R001, V600R002, V600R003 V100R005 AR150&200 V200R002C00 AR1200/ AR2200/ AR3200 V200R001, V200R002C00 AR200-S V200R002C00 AR1200-S&2200-S V200R001, V200R002C00 AR19/29/49 R2209 and earlier AR 28/46 R0311 and earlier AR 18-3x R0118 and earlier AR 18-2x R1712 and earlier AR18-1x R0130 and earlier Switch series products S9700 S9300 V200R001 V100R001,V100R002,V100R003,V100R006 V200R001 S8500 R1652 and earlier S7800 R6x05 and earlier S7700 V100R003,V100R006 V200R001 S6700 V100R006 S6500 R3234 and earlier S3300HI/S5300HI/S5306/S6300 S2700/S3700/S5700 S2300/S3300/S5300 V100R006 V200R001 V100R005,V100R006 V200R001 V100R002, V100R003, V100R005, V100R006 Firewall/Gateway series products Eudemon8000E-X/USG9500 V200R001C00SPC600 and earlier Eudemon8080E&8160E/USG9300 V100R003C00 and earlier Eudemon1000E-X/USG5500 V200R002 and earlier Eudemon1000E-U/USG5300 V200R001 and earlier USG5300(including DDOS version) V100R005C00 E200E-C&X3&X5&X7/USG2200&5100 V200R003C00 and earlier E200E-B&X1&X2/USG2100/ EGW2100&2200&3200 V100R005C01 and earlier Eudemon300&500&1000 V200R006C02 and earlier Eudemon100E V200R007 Eudemon200 V200R001 SRG1200&2200&3200 V100R002C02 SRG1201 V100R002C05 SVN5300 V100R001C01B019 SVN2000&5000 V200R001C00 SVN3000 V100R002C02SPC802B041 NIP2100&2200&5100 V100R001C00 Wireless series products SGSN9810 V900R010 USN9810 V900R001 V900R011 CG9812 V500R005C25/C27 GGSN9811 V900R007C01/C02/C03 V900R008C00/C01 UGW9811 V900R001C03/C05 V900R009C00/C01/C02 PDSN9960 V900R007C02/C03/C05/C06 HA9661 V900R007C06 WASN9770 V300R003C02 MAG9811 V100R001C00 Impact Attackers can obtain the local user account and password. Vulnerability Scoring Details The vulnerability classification has been performed by using the CVSSv2 scoring system (http://www.first.org/cvss/). Base Score: 8.5 (AV:N/AC:M/Au:S/C:C/I:C/A:C) Temporal Score: 7.3 (E:F/RL:OF/RC:C) Technique Details 1. Prerequisite: Must have an SNMP community string and have the access to the device; 2. Attacking procedure: Access the relevant MIB by snmp specified operation to obtain the local user account and password. Temporary Fix The following workarounds are only applicable to the products of NE5000E/ MA5200G / NE40E&80E/ATN/NE40&80/NE20E-X6/NE20/ME60/CX600/CX200&CX300/MAG9811. For the workarounds of the other involving products, please refer to the following Configuration Guide, the download link is: http://support.huawei.com/enterprise/NewsReadAction.action?newType=0301&conte ntId=NEWS1000001151&idAbsPath=0301_10001&nameAbsPath=Services%2520Ne ws 1.It is suggested to disable the SNMP function (the function of SNMP is disabled by default on Huawei devices). Or do not define local users, use RADIUS or HWTACACS. Query the status of SNMP and SNMP agent is not enabled. [HUAWEI]display snmp-agent sys-info 2.When Huawei devices enable SNMP, the default version to be used is V3. It is not suggested to use V1 and V2. Query the status of SNMP: [HUAWEI]display snmp-agent sys-info If the query result is displayed as: SNMP version running in the system: SNMPv1 SNMPv2c SNMPv3 Disable SNMP V1/V2: [HUAWEI]undo snmp-agent sys-info version v1 v2c 3.If SNMP V1/V2 protocol is applied, it is needed to block SNMP V1/V2 by using access controls or firewalls; The configuration example: [HUAWEI] acl 2001 [HUAWEI-acl-basic-2001] rule 5 permit source 1.1.1.2 0.0.0.0 [HUAWEI-acl-basic-2001] rule 6 deny source 1.1.1.1 0.0.0.0 [HUAWEI-acl-basic-2001] quit [HUAWEI] snmp-agent community read cipher security-read mib-view userinfo acl 2001 [HUAWEI] snmp-agent community write cipher security-write mib-view userinfo acl 2001 Note: The above-mentioned community names are just used as examples. For the actual configuration, the community names with high complexity are needed. 4.If SNMP V1/V2 protocol is applied, it is suggested to disable the SNMP V1/V2 mib entries for querying user account; The configuration example: [HUAWEI] snmp-agent mib-view include userinfo internet [HUAWEI] snmp-agent mib-view excluded userinfo snmpUsmMIB [HUAWEI] snmp-agent mib-view excluded userinfo snmpVacmMIB [HUAWEI] snmp-agent mib-view excluded userinfo hwLocalUserTable [HUAWEI] snmp-agent mib-view excluded userinfo hwCfgOperateTable [HUAWEI] snmp-agent mib-view excluded userinfo hwCollectTable [HUAWEI] snmp-agent community read cipher security-read mib-view userinfo [HUAWEI] snmp-agent community write cipher security-write mib-view userinfo Note: Before performing step 4, confirm with the NMS (Network Management Station) provider that disabling MIB nodes does not affect the NMS services. If disabling a MIB node affects the NMS services, do not run the snmp-agent mib-view excluded userinfo xxx command for this node. Software Versions and Fixes To be updated Obtaining Fixed Software To be updated Contact Channel for Technique Issue PSIRT@huawei.com Revision History Initial version 1.0 25/10/2012 Updated version 2.0 13/11/2012 Updated version 3.0 24/11/2012 Exploitation and Vulnerability Source This vulnerability is found by Kurt Grutzmacher. The Huawei PSIRT is not aware of any public announcements or malicious use of the vulnerability described in this advisory. Huawei express our appreciation for Kurt Grutzmacher’s concerns on Huawei products. Declaration This document is provided on an "AS IS" basis and does not imply any kind of guarantee or warranty, either express or implied, including the warranties of merchantability or fitness for a particular purpose. In no event shall Huawei Investment & Holding Co., Ltd. or any of its directly or indirectly controlled subsidiaries or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. Your use of the document, by whatsoever means, will be totally at your own risk. Huawei is entitled to amend or update this document from time to time. The information and data embodied in this document and any attachment are strictly confidential information of Huawei and are supplied on the understanding that they will be held confidentially and not disclosed to third parties without the prior written consent of Huawei. You shall use all reasonable efforts to protect the confidentiality of information. In particular, you shall not directly or indirectly disclose, allow access to, transmit or transfer the information to a third party without our prior written consent. Thank for your co-operation. Huawei Security Procedures Contact us through PSIRT@huawei.com if you need to: 1. Provide feedback on security vulnerability of Huawei products. 2. Get support for Huawei security emergency response services. 3. Obtain Huawei security vulnerability information. News End