Thanks Thanks:  0
Showing results 1 to 7 of 7

Thread: Radio Vulnerabilities Ceragon, Dragonwave etc

  1. #1
    Moderator Reputation: 153
    Join Date
    2011-05-10
    Posts
    364
    Last edited by simog72; 2017-08-09 at 10:21 PM
    **** COMMODORE 64 BASIC V2 ****
    64K RAM SYSTEM 38911 BASIC BYTES FREE
    READY.

  2. # ADS
    Circuit advertisement
    Join Date
    Always
    Posts
    Many
     

  3. #2
    Member Reputation: 278
    Join Date
    2008-08-13
    Location
    I don't even know anymore
    Posts
    320

    Default Re: Radio Vulnerabilities Ceragon, Dragonwave etc

    This is not the only backdoor access to IP10, there's a better one.

    I also know there's a backdoor to NEC radios, but I never got it.

  4. #3
    VIP Member Reputation: 1852 carver's Avatar
    Join Date
    2007-10-24
    Location
    Ukraine
    Posts
    563

    Default Re: Radio Vulnerabilities Ceragon, Dragonwave etc

    yea,
    my Ceragon ip20 series has root and snmp backdoors too,
    and DragonWave allow root, and i think NEC ipasso too(forgot).

    but many operator equipments has root/root and admin/admin accounts,
    so it's OK, in any case we used firewall/VPN/DMZ/VLAN/etc for our equipment.
    it's not problem.
    /carv

  5. #4
    Member Reputation: 261
    Join Date
    2009-01-17
    Location
    here and there
    Posts
    344

    Default Re: Radio Vulnerabilities Ceragon, Dragonwave etc

    And usually network elements and MNG interfaces are operated within a private IP network so access from outside is anyway quite challenging

  6. #5
    Junior Member Reputation: 10
    Join Date
    2017-06-11
    Posts
    2

    Default Re: Radio Vulnerabilities Ceragon, Dragonwave etc

    how to do it with private ip network?

  7. #6
    Member Reputation: 278
    Join Date
    2008-08-13
    Location
    I don't even know anymore
    Posts
    320

    Default Re: Radio Vulnerabilities Ceragon, Dragonwave etc

    Quote Originally Posted by carver View Post
    but many operator equipments has root/root and admin/admin accounts,
    so it's OK, in any case we used firewall/VPN/DMZ/VLAN/etc for our equipment.
    it's not problem.
    Did you change at least the default user/pass on the firewall itself?

    People, be serious about this. Admin/admin on your MW IDU is how russian hackers do things like changing your default AC temperature to electing Trump as US president.

  8. #7
    VIP Member Reputation: 1852 carver's Avatar
    Join Date
    2007-10-24
    Location
    Ukraine
    Posts
    563

    Default Re: Radio Vulnerabilities Ceragon, Dragonwave etc

    russian hackers used incremental Fail2ban at our ubuntu/unix servers/desktop.
    or 16+ chars password. no root/root ))))

    https://habrahabr.ru/post/238303/

    Quote Originally Posted by byja View Post
    Did you change at least the default user/pass on the firewall itself?

    People, be serious about this. Admin/admin on your MW IDU is how russian hackers do things like changing your default AC temperature to electing Trump as US president.
    /carv

Bookmarks

Bookmarks

Posting Rules

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •