Vulnerability Note VU#438928
Huawei HG532 routers contain a path traversal vulnerability
Original Release date: 06 Nov 2015 | Last revised: 09 Nov 2015

Overview
Huawei HG532 routers, including the HG532e, n, s, and possibly other models, are vulnerable to arbitrary file access through path traversal.

Description
CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) – CVE-2015-7254
In vulnerable Huawei router models, the /icon/ path of requests to Internet-facing TCP port 37215 can be manipulated to gain access to arbitrary files. For instance, a remote, unauthenticated attacker could read the inittab file by directly requesting http://<target_IP>:37215/icon/../../../etc/inittab.

Impact
A LAN-based attacker can access arbitrary files on vulnerable devices. Note that in some configurations, an external attacker may be able to leverage this vulnerability.

Solution
Apply an update

The vendor is in the process of releasing firmware updates to carriers to address this vulnerability. Users are encouraged to contact their carrier to obtain the latest release, but should consider the following workaround when a patch is unavailable.
Restrict access

As a general good security practice, only allow connections from trusted hosts and networks.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate UpdatedHuawei TechnologiesAffected03 Sep 201509 Nov 2015If you are a vendor and your product is affected, let
us know.

CVSS Metrics (Learn More)

Group
Score
Vector

Base
3.3
AV:A/AC:L/Au:N/C:P/I:N/A:N

Temporal
2.7
E:F/RL:OF/RC:C

Environmental
2.0
CDP:N/TD:M/CR:ND/IR:ND/AR:ND

References

http://www.huawei.com/en/security/psirt/security-bulletins/security-notices/hw-460507.htm
https://cwe.mitre.org/data/definitions/22.html

Credit

Thanks to Roberto Paleari and Aristide Fattori for reporting this vulnerability.
This document was written by Joel Land.

Other Information

CVE IDs:
CVE-2015-7254

Date Public:
06 Nov 2015

Date First Published:
06 Nov 2015

Date Last Updated:
09 Nov 2015

Document Revision:
19

FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.

Leave a Reply