CVE-2018-20382
📋 TL;DR
This vulnerability allows remote attackers to retrieve device credentials via specific SNMP OID requests on affected Jiuzhou BCM93383WRG devices. Attackers can obtain passwords and other sensitive information without authentication. Organizations using these specific cable modem/gateway devices are affected.
💻 Affected Systems
- Jiuzhou BCM93383WRG
📦 What is this software?
Bcm93383wrg Firmware by Jezetek Intl
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise leading to network infiltration, credential theft, and potential lateral movement to other systems.
Likely Case
Unauthorized access to device configuration, credential harvesting, and potential man-in-the-middle attacks.
If Mitigated
Limited to information disclosure if SNMP access is properly restricted and monitored.
🎯 Exploit Status
Simple SNMP queries to specific OIDs (iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0) return credentials. No authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No known vendor advisory
Restart Required: No
Instructions:
No official patch available. Check with device vendor for firmware updates.
🔧 Temporary Workarounds
Disable SNMP or restrict access
allDisable SNMP service entirely or configure access control lists to restrict SNMP access to trusted IPs only.
# Access device web interface
# Navigate to SNMP settings
# Disable SNMP or configure ACLs
Change default credentials
allChange all default passwords and credentials on the device.
# Access device administration interface
# Navigate to password/security settings
# Change admin and user passwords
🧯 If You Can't Patch
- Isolate affected devices in separate network segments with strict firewall rules
- Implement network monitoring for SNMP traffic to the vulnerable OIDs
🔍 How to Verify
Check if Vulnerable:
Use snmpwalk or similar SNMP tool to query OIDs iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0. If they return credential information, device is vulnerable.
Check Version:
# Check device web interface for firmware version or use snmpwalk to query system information OIDs
Verify Fix Applied:
After implementing workarounds, verify SNMP queries to the vulnerable OIDs no longer return credential data or are blocked entirely.
📡 Detection & Monitoring
Log Indicators:
- SNMP queries to OIDs 1.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and 1.3.6.1.4.1.4491.2.4.1.1.6.1.2.0
- Multiple failed authentication attempts following SNMP queries
Network Indicators:
- SNMP traffic (UDP 161) from untrusted sources to affected devices
- Unusual SNMP query patterns
SIEM Query:
source_port=161 AND (oid="1.3.6.1.4.1.4491.2.4.1.1.6.1.1.0" OR oid="1.3.6.1.4.1.4491.2.4.1.1.6.1.2.0")
🔗 References
- https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv
- https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html
- https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv
- https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html