Lenovo inherited a switch authentication bypass – from Nortel
A long time ago, in a company far, far away …
Lenovo has patched an ancient vulnerability in switches that it acquired along with IBM's hardware businesses and which Big Blue itself acquired when it slurped parts of Nortel.
The bug, which Lenovo refers to as “HP backdoor”, for reasons it has not explained, has been in present in ENOS (Enterprise network operating system) since at least 2004 – when ENOS was still under the hand of Nortel.
Lenovo's advisory says the issue “was discovered during a Lenovo security audit in the Telnet and Serial Console management interfaces, as well as the SSH and Web management interfaces under certain limited and unlikely conditions”.
There are three vulnerable scenarios, the advisory said:
- Authentication via the Telnet or serial consoles, if used for local authentication, “or a combination of RADIUS, TACACS+, or LDAP and local authentication under specific circumstances”;
- The Web management interface is vulnerable when the user is authenticating via “a combination of RADIUS or TACACS+ and local authentication”, and then only in “an unlikely condition”; and
- “SSH for certain firmware released in May 2004 through June 2004”, again with a combination of RADIUS or TACACS+.
The “unlikely conditions” Lenovo referred to depend on which interface is potentially being attacked.
For SSH access, the management interface is only vulnerable if the system is running firmware created between May and June 2004; RADIUS and/or TACACS+ is enable; the related “backdoor / secure backdoor” local authentication fallback is enabled (in this case, “backdoor” refers to a RADIUS configuration setting); and finally, a RADIUS or TACACS+ timeout occurs.
The conditions for attacking the Web management interface are that the system suffers “an unlikely out-of-order execution condition (race condition) occurs, RADIUS or TACACS+ are enabled (as is the “backdoor / secure backdoor” local authentication fallback), and the RADIUS/TACACS+ timeout occurs.
Telnet and serial console attacks interfaces are vulnerable if LDAP, RADIUS or TACACS+ are all disabled. If any of these are enabled, the vulnerability only exists if authentication fallback is enabled and a RADIUS/TACACS+ timeout happens.
The advisory offers something of a potted history of the networking industry since Nortel's collapse: the authentication bypass was added in 2004, when code was written in response to a request from a Blade Server Switch Business Unit OEM customer (readers with long memories will recall that HP was a reseller of the switches, back in the day). In 2006, already deep in the series of scandals that eventually consumed the company, Nortel spun the switch business out to form a company called Blade Network Technologies. That company was acquired by IBM in 2010, and passed on to Lenovo in 2014. ®