CVE-2020-29060

9.8 CRITICAL

📋 TL;DR

This vulnerability involves CDATA networking devices having a default hardcoded password 'debug124' for the debug account, allowing attackers to gain unauthorized access. It affects multiple CDATA OLT (Optical Line Terminal) models listed in the CVE. Organizations using these devices are at risk of compromise.

💻 Affected Systems

Products:
  • CDATA 72408A
  • CDATA 9008A
  • CDATA 9016A
  • CDATA 92408A
  • CDATA 92416A
  • CDATA 9288
  • CDATA 97016
  • CDATA 97024P
  • CDATA 97028P
  • CDATA 97042P
  • CDATA 97084P
  • CDATA 97168P
  • CDATA FD1002S
  • CDATA FD1104
  • CDATA FD1104B
  • CDATA FD1104S
  • CDATA FD1104SN
  • CDATA FD1108S
  • CDATA FD1204S-R2
  • CDATA FD1204SN
  • CDATA FD1204SN-R2
  • CDATA FD1208S-R2
  • CDATA FD1216S-R1
  • CDATA FD1608GS
  • CDATA FD1608SN
  • CDATA FD1616GS
  • CDATA FD1616SN
  • CDATA FD8000
Versions: All versions with default configuration
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices are vulnerable if the default debug account with password 'debug124' has not been disabled or the password changed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over the device, enabling them to disrupt network services, intercept traffic, deploy malware, or use the device as a pivot point into the internal network.

🟠

Likely Case

Unauthorized access leading to configuration changes, service disruption, or data interception, especially if devices are internet-facing or in poorly segmented networks.

🟢

If Mitigated

Limited impact if devices are isolated in secure network segments with strict access controls and monitoring, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the device's management interface and knowledge of the default credentials, but is straightforward once access is gained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

No official patch is mentioned. Contact CDATA for firmware updates or security advisories. In the meantime, apply workarounds such as changing the default password or disabling the debug account.

🔧 Temporary Workarounds

Change Default Debug Password

all

Change the password for the debug account from 'debug124' to a strong, unique password.

Log into the device management interface, navigate to user/account settings, locate the debug account, and change its password.

Disable Debug Account

all

Disable or remove the debug account if it is not required for operations.

Log into the device management interface, navigate to user/account settings, and disable or delete the debug account.

🧯 If You Can't Patch

  • Isolate affected devices in a secure network segment with strict firewall rules to limit access.
  • Implement network monitoring and intrusion detection to alert on unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Attempt to log into the device's management interface using username 'debug' and password 'debug124'. If successful, the device is vulnerable.

Check Version:

Check the device firmware version via the management interface or CLI, but specific commands vary by model.

Verify Fix Applied:

After applying workarounds, attempt to log in with the old credentials; access should be denied. Verify the new password works if changed.

📡 Detection & Monitoring

Log Indicators:

  • Failed or successful login attempts to the debug account
  • Configuration changes from the debug account

Network Indicators:

  • Unauthorized access to device management ports (e.g., SSH, Telnet, web interface)
  • Traffic anomalies from the device

SIEM Query:

Example: 'source_ip=* AND (event_type=login_failure OR event_type=login_success) AND username=debug'

🔗 References

📤 Share & Export