CVE-2018-20390
📋 TL;DR
This vulnerability allows remote attackers to retrieve device credentials via specific SNMP OID requests. It affects Kaonmedia CG2001-AN22A, CG2001-UDBNA, and CG2001-UN2NA devices running vulnerable firmware versions. Attackers can obtain authentication credentials without authentication.
💻 Affected Systems
- Kaonmedia CG2001-AN22A
- Kaonmedia CG2001-UDBNA
- Kaonmedia CG2001-UN2NA
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise leading to network infiltration, data theft, and potential use as pivot point for lateral movement.
Likely Case
Credential theft enabling unauthorized access to device management interfaces and configuration changes.
If Mitigated
Limited to credential exposure if SNMP access is restricted, but still represents significant information disclosure.
🎯 Exploit Status
Simple SNMP GET requests to specific OIDs (iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0) return credentials. Public proof-of-concept scripts exist.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No vendor advisory found
Restart Required: No
Instructions:
No official patch available. Check with Kaonmedia for firmware updates. Consider replacing devices if no fix is provided.
🔧 Temporary Workarounds
Disable SNMP or Restrict Access
allDisable SNMP service entirely or configure SNMP access controls to restrict which hosts can query the device.
# Configuration varies by device - check device web interface or CLI for SNMP settings
Change SNMP Community Strings
allChange default SNMP community strings to strong, unique values and use SNMPv3 with authentication.
# Use device management interface to change SNMP community strings
🧯 If You Can't Patch
- Isolate affected devices in separate VLAN with strict firewall rules blocking SNMP traffic (UDP 161) from untrusted networks.
- Implement network monitoring to detect SNMP queries to the vulnerable OIDs and alert on credential exposure attempts.
🔍 How to Verify
Check if Vulnerable:
Use snmpwalk or snmpget to query OIDs iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0. If they return values, device is vulnerable.
Check Version:
Check device web interface or use SNMP to query system description OIDs (typically 1.3.6.1.2.1.1.1.0)
Verify Fix Applied:
After applying workarounds, verify SNMP queries to vulnerable OIDs return no data or access is denied.
📡 Detection & Monitoring
Log Indicators:
- SNMP authentication failures
- Unusual SNMP query patterns
- Access from unexpected IP addresses to SNMP port
Network Indicators:
- SNMP queries to iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 or iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 OIDs
- High volume of SNMP traffic to specific devices
SIEM Query:
source_port=161 AND (oid="1.3.6.1.4.1.4491.2.4.1.1.6.1.1.0" OR oid="1.3.6.1.4.1.4491.2.4.1.1.6.1.2.0")
🔗 References
- https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv
- https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html
- https://github.com/ezelf/sensitivesOids/blob/master/oidpassswordleaks.csv
- https://misteralfa-hack.blogspot.com/2018/12/stringbleed-y-ahora-que-passwords-leaks.html