Password Glitch Exposes DSL Subscribers

Cayman Systems confirmed Wednesday that a potentially serious security
vulnerability exists in the DSL equipment it supplies to many leading
providers, including SBC Communication’s numerous subsidiaries such as
Pacific Bell and Southwestern Bell, as well as to Verizon and Nortel Networks.


At the request of its service provider customers, Cayman ships its Cayman
3220 DSL Router without setting an administrator password on the devices.
Without such an access control, a remote attacker could take over the
device and gain access to any equipment connected to it, according to the
Massachusetts-based company.


“If you have somebody’s IP address, then you can go in and access that
system in many ways. If you have enough stick-tuitiveness, you can go in
and do all kinds of things,” said Marilyn Maquire, a senior product manager
for Cayman.


Cayman estimates that nearly 100,000 of the devices have been installed by
DSL providers on behalf of their subscribers. Only a small percentage of
users have not properly set up an administrative password, according to Maquire.


But Andrew Siverly, an Internet security expert who discovered the
vulnerability, said he recently identified hundreds of Cayman routers on
networks operated by SBC that are exposed. A similar report was
independently posted
Wednesday on a mailing list for network operators.


Among the SBC customers confirmed to be vulnerable by InternetNews
Wednesday were a Ford dealer and an insurance company, both located in the
Houston, Texas area. Using the router’s web-based interface, or a telnet
connection, a remote attacker could perform a number of administrative
functions on the company’s routers, potentially denying service, re-routing
traffic, or monitoring data flowing through the network.


SBC officials were not available to explain why the company specifies that
its supplier ship routers without password protection enabled.


SBC has known about the vulnerability since early 2000, according to
Siverly, who said he discussed the issue with the senior IT staff at the
telecommunications firm.


“They told me to go away, and if I published my bug they would give me a
big headache,” said Siverly, who eventually posted an advisory
about the vulnerability on the Bugtraq security mailing list.


Because of potential liability issues, many ISPs are reluctant to be
proactive in notifying subscribers about security issues, according to John
Navas, a California-based telecommunications analyst.


“There’s an honest dilemma here. I’m disappointed that most providers tell
users that its their responsibility to deal with security issues. But the
questions of their liability are not insignificant,” said Navas.


Cayman last year added a function to its router software that warns users
if they have not established a password. But the company said ISPs, which
have direct, front-line service contact with the end-user, must take
responsibility for seeing that the security hole is closed.


“We’ve done everything we can to educate out customers about what this
particular password is and why it’s important to set. If people are
receiving the gateway and not setting the password, we’re in an awkward
situation. We can’t force our customers to set the password,” said Maquire.


While the Cayman unit is based on a chipset from Alcatel, the password
vulnerability is not related to a recent security issue with Alcatel DSL modems recently reported by the San Diego
Supercomputer Center.

Get the Free Newsletter!

Subscribe to our newsletter.

Subscribe to Daily Tech Insider for top news, trends & analysis

News Around the Web