CVE-2017-6532
📋 TL;DR
Televes COAXDATA GATEWAY 1Gbps devices store credentials in cleartext in the /mib.db file, allowing attackers to read sensitive authentication information. This affects users of Televes COAXDATA GATEWAY 1Gbps devices running firmware version doc-wifi-hgw_v1.02.0014 4.20.
💻 Affected Systems
- Televes COAXDATA GATEWAY 1Gbps
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full device compromise leading to network infiltration, credential theft, and potential lateral movement within connected networks.
Likely Case
Unauthorized access to device configuration, credential harvesting, and potential man-in-the-middle attacks.
If Mitigated
Limited impact if device is isolated and access controls prevent file system access.
🎯 Exploit Status
Exploitation requires access to read the /mib.db file, which may be accessible via web interface or file system access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Check vendor website for firmware updates.
🔧 Temporary Workarounds
Restrict File Access
linuxLimit access to the /mib.db file through file permissions or access controls.
chmod 600 /mib.db
chown root:root /mib.db
Network Segmentation
allIsolate affected devices in separate network segments to limit exposure.
🧯 If You Can't Patch
- Monitor for unauthorized access attempts to the device and file system.
- Implement strict network access controls and consider replacing vulnerable devices.
🔍 How to Verify
Check if Vulnerable:
Check if /mib.db file exists and contains cleartext credentials: cat /mib.db | grep -i password
Check Version:
Check firmware version via device web interface or CLI: cat /etc/version
Verify Fix Applied:
Verify /mib.db file permissions are restricted and credentials are encrypted or removed.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to /mib.db
- File read operations on sensitive database files
Network Indicators:
- Unusual outbound connections from the device
- Traffic patterns indicating credential harvesting
SIEM Query:
source="televes_gateway" AND (event="file_access" AND file="/mib.db")