Vulnerability Note VU#438928

Huawei HG532 routers contain a path traversal vulnerability

Original Release date: 06 Nov 2015 | Last revised: 09 Nov 2015

Overview

Huawei HG532 routers, including the HG532e, n, s, and possibly other models, are vulnerable to arbitrary file access through path traversal.

Description

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') - CVE-2015-7254

In vulnerable Huawei router models, the /icon/ path of requests to Internet-facing TCP port 37215 can be manipulated to gain access to arbitrary files. For instance, a remote, unauthenticated attacker could read the inittab file by directly requesting http://<target_IP>:37215/icon/../../../etc/inittab.

Impact

A LAN-based attacker can access arbitrary files on vulnerable devices. Note that in some configurations, an external attacker may be able to leverage this vulnerability.

Solution

Apply an update

The vendor is in the process of releasing firmware updates to carriers to address this vulnerability. Users are encouraged to contact their carrier to obtain the latest release, but should consider the following workaround when a patch is unavailable.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Huawei TechnologiesAffected03 Sep 201509 Nov 2015
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 3.3 AV:A/AC:L/Au:N/C:P/I:N/A:N
Temporal 2.7 E:F/RL:OF/RC:C
Environmental 2.0 CDP:N/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Roberto Paleari and Aristide Fattori for reporting this vulnerability.

This document was written by Joel Land.

Other Information

  • CVE IDs: CVE-2015-7254
  • Date Public: 06 Nov 2015
  • Date First Published: 06 Nov 2015
  • Date Last Updated: 09 Nov 2015
  • Document Revision: 19

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.