CVE-2018-12455 Scanner

CVE-2018-12455 Scanner - Authentication Bypass vulnerability in Intelbras NPLUG

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

8 days 7 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

The Intelbras NPLUG is an IoT device designed to extend network capabilities, often used in home and small office environments for connectivity and device management. It provides wireless networking functionalities and is managed via a web-based interface. The device firmware includes authentication mechanisms to protect access to sensitive configuration data and administrative functions. Users rely on the security of the authentication process to prevent unauthorized access and configuration changes. The device is popular in its market segment for ease of use and integration with other network devices. Firmware updates are periodically released to fix vulnerabilities and improve security.

This vulnerability involves an authentication bypass that allows attackers to access the device without valid credentials. By manipulating the HTTP cookie header and setting a cookie named "admin:", an attacker can bypass the login process entirely. This flaw results from improper validation of cookie values used for authentication, enabling unauthorized access. The issue is critical because it exposes device configurations and administrative controls to unauthenticated attackers. This vulnerability significantly increases the risk of device compromise and subsequent network attacks.

Technically, the vulnerability is exploited by sending a GET request to the /cgi-bin/DownloadCfg/RouterCfm.cfg endpoint with the HTTP header Cookie: admin:. The device fails to verify the authenticity of this cookie and returns the configuration file with sensitive information. The response is characterized by a content type related to configuration data and includes wireless parameters and password hashes. The flaw lies in the device’s firmware handling of cookie-based authentication, which does not enforce proper checks or session management.

Exploiting this vulnerability enables attackers to obtain the full router configuration file, including sensitive credentials and network settings. This can lead to full network takeover, interception of traffic, unauthorized changes, and persistent access. Attackers may also modify firewall or DNS settings, disrupting network operations or redirecting traffic maliciously. The vulnerability presents a severe security risk and requires immediate remediation through firmware upgrades. Proper access controls and monitoring can mitigate exploitation risks.

REFERENCES

Get started to protecting your digital assets