VAR-200604-0488
Vulnerability from variot - Updated: 2025-04-03 19:48na-img-4.0.34.bin for the IP3 Networks NetAccess NA75 has a default username of admin and a default password of admin. IP3 Networks NetAccess NA75 devices are susceptible to multiple local vulnerabilities: - A command-injection vulnerability due to insufficient input-sanitization of user-supplied commands. This issue allows attackers to execute arbitrary shell commands in the underlying UNIX-based operating system. - An encrypted-password information-disclosure vulnerability. This issue may aid attackers in brute-force password-guessing attacks. - An insecure default-permissions vulnerability. This issue allows attackers to access or corrupt potentially sensitive information. These issues are present in version 4.0.34 of the device's firmware; other versions may also be affected.
TITLE: IP3 Networks NA75 SQL Injection Vulnerability and Weaknesses
SECUNIA ADVISORY ID: SA19818
VERIFY ADVISORY: http://secunia.com/advisories/19818/
CRITICAL: Less critical
IMPACT: Security Bypass, Manipulation of data, Exposure of sensitive information, Privilege escalation
WHERE:
From local network
OPERATING SYSTEM: IP3 Networks NA75 http://secunia.com/product/9602/
DESCRIPTION: Ralph Moonen has reported a vulnerability and some weaknesses in IP3 Networks NA75, which can be exploited by malicious, local users to potentially gain escalated privileges and disclose or manipulate sensitive information, or by malicious people to conduct SQL injection attacks.
1) Some input passed in the web interface is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Example: * The password field during login.
2) Some input validation errors in the command line interface can be exploited to inject arbitrary shell commands via the "`" backtick character.
3) The shadow password file has world-readable permissions, which can be exploited to disclose other users' encrypted passwords.
4) The database file is stored with world-readable and world-writable permissions.
SOLUTION: Apply patch available from the vendor. http://www.ip3.com/supportoverview.htm
PROVIDED AND/OR DISCOVERED BY: Ralph Moonen
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200604-0488",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "netaccess 75",
"scope": "eq",
"trust": 1.6,
"vendor": "ip3",
"version": "4.0.34"
},
{
"model": "networks na75",
"scope": "eq",
"trust": 0.3,
"vendor": "ip3",
"version": "4.0.34"
}
],
"sources": [
{
"db": "BID",
"id": "17698"
},
{
"db": "CNNVD",
"id": "CNNVD-200604-517"
},
{
"db": "NVD",
"id": "CVE-2006-2044"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ralph Moonen reported these vulnerabilities.",
"sources": [
{
"db": "BID",
"id": "17698"
},
{
"db": "CNNVD",
"id": "CNNVD-200604-517"
}
],
"trust": 0.9
},
"cve": "CVE-2006-2044",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2006-2044",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-18152",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2006-2044",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-200604-517",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-18152",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-18152"
},
{
"db": "CNNVD",
"id": "CNNVD-200604-517"
},
{
"db": "NVD",
"id": "CVE-2006-2044"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "na-img-4.0.34.bin for the IP3 Networks NetAccess NA75 has a default username of admin and a default password of admin. IP3 Networks NetAccess NA75 devices are susceptible to multiple local vulnerabilities:\n- A command-injection vulnerability due to insufficient input-sanitization of user-supplied commands. This issue allows attackers to execute arbitrary shell commands in the underlying UNIX-based operating system. \n- An encrypted-password information-disclosure vulnerability. This issue may aid attackers in brute-force password-guessing attacks. \n- An insecure default-permissions vulnerability. This issue allows attackers to access or corrupt potentially sensitive information. \nThese issues are present in version 4.0.34 of the device\u0027s firmware; other versions may also be affected. \n\nTITLE:\nIP3 Networks NA75 SQL Injection Vulnerability and Weaknesses\n\nSECUNIA ADVISORY ID:\nSA19818\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/19818/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSecurity Bypass, Manipulation of data, Exposure of sensitive\ninformation, Privilege escalation\n\nWHERE:\n\u003eFrom local network\n\nOPERATING SYSTEM:\nIP3 Networks NA75\nhttp://secunia.com/product/9602/\n\nDESCRIPTION:\nRalph Moonen has reported a vulnerability and some weaknesses in IP3\nNetworks NA75, which can be exploited by malicious, local users to\npotentially gain escalated privileges and disclose or manipulate\nsensitive information, or by malicious people to conduct SQL\ninjection attacks. \n\n1) Some input passed in the web interface is not properly sanitised\nbefore being used in a SQL query. This can be exploited to manipulate\nSQL queries by injecting arbitrary SQL code. \n\nExample:\n* The password field during login. \n\n2) Some input validation errors in the command line interface can be\nexploited to inject arbitrary shell commands via the \"`\" backtick\ncharacter. \n\n3) The shadow password file has world-readable permissions, which can\nbe exploited to disclose other users\u0027 encrypted passwords. \n\n4) The database file is stored with world-readable and world-writable\npermissions. \n\nSOLUTION:\nApply patch available from the vendor. \nhttp://www.ip3.com/supportoverview.htm\n\nPROVIDED AND/OR DISCOVERED BY:\nRalph Moonen\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2006-2044"
},
{
"db": "BID",
"id": "17698"
},
{
"db": "VULHUB",
"id": "VHN-18152"
},
{
"db": "PACKETSTORM",
"id": "45748"
}
],
"trust": 1.35
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "17698",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "19818",
"trust": 1.8
},
{
"db": "SREASON",
"id": "793",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2006-1540",
"trust": 1.7
},
{
"db": "NVD",
"id": "CVE-2006-2044",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-200604-517",
"trust": 0.7
},
{
"db": "BUGTRAQ",
"id": "20060424 MULTIPLE VULNERABILITIES IN IP3 NETWORKS \u0027NETACCESS\u0027 NA75 APPLIANCE",
"trust": 0.6
},
{
"db": "XF",
"id": "26112",
"trust": 0.6
},
{
"db": "XF",
"id": "3",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-18152",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "45748",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-18152"
},
{
"db": "BID",
"id": "17698"
},
{
"db": "PACKETSTORM",
"id": "45748"
},
{
"db": "CNNVD",
"id": "CNNVD-200604-517"
},
{
"db": "NVD",
"id": "CVE-2006-2044"
}
]
},
"id": "VAR-200604-0488",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-18152"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-03T19:48:52.908000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-2044"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/17698"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/19818"
},
{
"trust": 1.7,
"url": "http://securityreason.com/securityalert/793"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/432007/100/0/threaded"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2006/1540"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26112"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/432007/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/26112"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2006/1540"
},
{
"trust": 0.3,
"url": "http://ip3networks.com/na75.htm"
},
{
"trust": 0.3,
"url": "http://www.ip3.com/"
},
{
"trust": 0.3,
"url": "/archive/1/432007"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://www.ip3.com/supportoverview.htm"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/9602/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/19818/"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-18152"
},
{
"db": "BID",
"id": "17698"
},
{
"db": "PACKETSTORM",
"id": "45748"
},
{
"db": "CNNVD",
"id": "CNNVD-200604-517"
},
{
"db": "NVD",
"id": "CVE-2006-2044"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-18152"
},
{
"db": "BID",
"id": "17698"
},
{
"db": "PACKETSTORM",
"id": "45748"
},
{
"db": "CNNVD",
"id": "CNNVD-200604-517"
},
{
"db": "NVD",
"id": "CVE-2006-2044"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-04-26T00:00:00",
"db": "VULHUB",
"id": "VHN-18152"
},
{
"date": "2006-04-25T00:00:00",
"db": "BID",
"id": "17698"
},
{
"date": "2006-04-27T21:57:26",
"db": "PACKETSTORM",
"id": "45748"
},
{
"date": "2006-04-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200604-517"
},
{
"date": "2006-04-26T20:06:00",
"db": "NVD",
"id": "CVE-2006-2044"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-10-18T00:00:00",
"db": "VULHUB",
"id": "VHN-18152"
},
{
"date": "2006-04-26T20:56:00",
"db": "BID",
"id": "17698"
},
{
"date": "2006-04-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200604-517"
},
{
"date": "2025-04-03T01:03:51.193000",
"db": "NVD",
"id": "CVE-2006-2044"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200604-517"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "IP3 Networks NetAccess NA75 Multiple Local Vulnerabilities",
"sources": [
{
"db": "BID",
"id": "17698"
},
{
"db": "CNNVD",
"id": "CNNVD-200604-517"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200604-517"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.