Data Centre

Networks

Lenovo inherited a switch authentication bypass – from Nortel

A long time ago, in a company far, far away …

By Richard Chirgwin

10 SHARE

Lenovo has patched an ancient vulnerability in switches that it acquired along with IBM's hardware businesses and which Big Blue itself acquired when it slurped parts of Nortel.

The bug, which Lenovo refers to as “HP backdoor”, for reasons it has not explained, has been in present in ENOS (Enterprise network operating system) since at least 2004 – when ENOS was still under the hand of Nortel.

Lenovo's advisory says the issue “was discovered during a Lenovo security audit in the Telnet and Serial Console management interfaces, as well as the SSH and Web management interfaces under certain limited and unlikely conditions”.

There are three vulnerable scenarios, the advisory said:

The “unlikely conditions” Lenovo referred to depend on which interface is potentially being attacked.

For SSH access, the management interface is only vulnerable if the system is running firmware created between May and June 2004; RADIUS and/or TACACS+ is enable; the related “backdoor / secure backdoor” local authentication fallback is enabled (in this case, “backdoor” refers to a RADIUS configuration setting); and finally, a RADIUS or TACACS+ timeout occurs.

The conditions for attacking the Web management interface are that the system suffers “an unlikely out-of-order execution condition (race condition) occurs, RADIUS or TACACS+ are enabled (as is the “backdoor / secure backdoor” local authentication fallback), and the RADIUS/TACACS+ timeout occurs.

Telnet and serial console attacks interfaces are vulnerable if LDAP, RADIUS or TACACS+ are all disabled. If any of these are enabled, the vulnerability only exists if authentication fallback is enabled and a RADIUS/TACACS+ timeout happens.

The advisory offers something of a potted history of the networking industry since Nortel's collapse: the authentication bypass was added in 2004, when code was written in response to a request from a Blade Server Switch Business Unit OEM customer (readers with long memories will recall that HP was a reseller of the switches, back in the day). In 2006, already deep in the series of scandals that eventually consumed the company, Nortel spun the switch business out to form a company called Blade Network Technologies. That company was acquired by IBM in 2010, and passed on to Lenovo in 2014. ®

Sign up to our NewsletterGet IT in your inbox daily

10 Comments

More from The Register

SuperFish cram scandal: Lenovo must now ask nicely before stuffing new PCs with crapware

In America, at least

Linux 4.19 lets you declare your trust in AMD, IBM and Intel

Wave the CPU trust flag if you're feeling safe enough

Intel's announced PCs packing 5G, and that's just plain wrong

Chipzilla needs more than its old PC-making pals to win 5G

NetApp takes slow boat to China: Inks deal with Lenovo on arrays, software

Setting up joint-venture to sell into Middle Kingdom

Don't you just love Windows 10 refreshes, yells Lenovo

Chinese biz exploits PC upgrade cycle... for the moment

Ubuntu 17.10 pulled: Linux OS knackers laptop BIOSes, Intel kernel driver fingered

Updated Free as in thank God I'm not paying for this

Lenovo heading towards Hong Kong exchange index boot

Hang Seng stock price fall leaves vendor facing blue chip index chop

Wang, bang, thank you, mang: Acer exec off to sell PCs for Lenovo

Now, how to do that in a stagnant market?

Cisco, Lenovo see XPoint in slapping Optane drives on hyperconverged kit

Add some Nvidia support, and everyone else is on catch-up

Remember when Lenovo sold PCs with Superfish adware? It just got a mild scolding from FTC

Settlement requires disclosure and monitoring, not much else