Feeds

Filesharers spread Allied Telesis networking 'backdoor' info

No need for alarm over password-recovery feature, says networking firm

The Essential Guide to IT Transformation

Updated "Backdoor passwords" for a range of Allied Telesis networking devices have been leaked online.

Allied Telesis said that although the leaked document referred to a "backdoor password" (screenshot via H Security here), this was an unfortunate choice of phrase for what was actually a password-recovery feature of the type most manufacturers build into their kit. It added that the login credentials would in any case only work given physical access to its networking equipment, so the approach wouldn't lend itself to remote hacking.

Sometimes other security vulnerabilities mean functions that ought only to work locally can be carried out remotely, of course. There's no evidence that this has happened in this particular case, but even so, making security-related documents that are meant to be restricted openly available is seldom a good idea. For example, a hard-coded back door in industrial control systems from Siemens facilitated the infamous Stuxnet worm. Built-in backdoor function can sometimes be put in by developers as a debugging tool and left in by mistake when code is released from development.

Allied Telesis maintained the password recovery feature as a way to regain control of networks when login credentials had been lost or (perhaps) in cases where legitimate owners had been locked out of their own network by rogue administrators. The documents detailing how to look up the relevant passwords were meant to be accessible only internally and were intended to be released only to properly authorised users who were able to complete a series of security checks. Customers were obliged to supply a MAC address, hardware serial number and, where possible, proof of purchase, before passwords could be released, according to documents obtained by Kaspersky Labs' Threat Post.

In a memo sent to customer on Wednesday (1 June), Allied Telesis said that the whole incident had been blown out of proportion.

Allied Telesis does not provide “backdoor passwords” for any of its products, and the feature referenced is actually an industry-standard password recovery tool similar to that used by technical support staff in technology companies globally. The utility referenced applies to an older version of our network operating system that is still supported but no longer available. Newer-generation Allied Telesis products are unaffected by this issue.

Having access to this information alone does not enable anyone to log into any devices. A person using this tool would need to be physically present inside a secure data center, would need to know the MAC address and serial number of that device and would need to be physically plugged into the “console port.” The tool merely resets a password back to its “factory default.” Changes in IT personnel, purchase of used equipment and lack of documentation are a few of the common reasons why our customers call technical support to reset passwords. For those customers, having the ability to re-enable a device is essential to ensure they can access and manage Allied Telesis products as part of their network solutions.

At Allied Telesis, information technology security is treated very seriously, and we take great care in protecting the integrity of our products. The public availability of this page appears to have resulted from an error in our third-party knowledgebase management software. The phrase “backdoor password” in the document title was caught as a keyword by an internet search engine. This caused a document intended for internal training use to appear as though it had intentionally been published in the public domain, which was not the case. We immediately removed it from our knowledgebase software and are working to ensure it is not repeated. Our staff is also being trained in the proper choice of words for labeling training documents.

An Excel spreadsheet which explained in detail how to generate alternative passwords for 20 different networking devices made by Allied Telesis, were inadvertently published on a public-facing website and not a closed private intranet. The file was indexed by Google and therefore made available to world + dog. News of the availability of the documents broke last week, shortly before the potential sensitive documents as well as a password-generator tool for Allied Telesis became available through filesharing sites.

Allied Telesis is reportedly working on removing the leaked documents from the filesharing sites, Help Net Security adds. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.