Friday, March 31, 2017
Obtaining Passwords from Cisco Wireless LAN Controllers
Obtaining Passwords from Cisco Wireless LAN Controllers
During security analysis, experts often deal with default accounts. Particularly, it is very usual for large companies having several hundred systems. Thats why one of the main requirements is to use complex non-dictionary passwords to comply with security standards and best practices.
There are two ways to test the system compliance with this requirement:
The former method can cause account lockout and thus is often found unacceptable. The latter one is preferable, but gives another problem if passwords are encrypted or hashed.
Let us consider how passwords are stored in Cisco Wireless LAN Controllers. The configuration file contains usernames and passwords for Cisco WLC in the following form:
config mgmtuser add encrypt admin2 1 5082d27dd0048bf167d04b96b9f2aad1 fbf57db49db49643897d14cd89d7ba14e96a4fbd 16 d20d07b60ff785d718b47837f1915dbe0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 read-write
The format differs from MD5, which is usually used in Cisco systems, isnt it? We need to find out what encryption (hashing) algorithm is being applied here.
So, the record format looks as follows:
config mgmtuser add encrypt ,
where:
It is worth mentioning that this storage format is used not only for account passwords, but for other passwords and secrets, too.
Below are given some sample templates that can precede the fieldsencType, iv, hmac, cbData, and data.
config local-auth method fast server-key encrypt
config mgmtuser add encrypt *
config radius auth add encrypt * * * password
config wlan security * akm * set-key * encrypt
transfer * encrypt password
Thus, if we have the configuration file of a Cisco WLC device, we can obtain and restore all encrypted passwords.
To avoid disclosure of account passwords, you should always encrypt configuration files with built-in Cisco WLC tools when transferring such files to an external server (see figure below).
Watch yourself ;)
Authors: Dmitry Sklyarov, Sergey Pavlov, Dmitry Kurbatov (Positive Research)
There are two ways to test the system compliance with this requirement:
- password brute-forcing,
- obtaining and checking passwords or their hashes from the system.
The former method can cause account lockout and thus is often found unacceptable. The latter one is preferable, but gives another problem if passwords are encrypted or hashed.
Let us consider how passwords are stored in Cisco Wireless LAN Controllers. The configuration file contains usernames and passwords for Cisco WLC in the following form:
config mgmtuser add encrypt admin2 1 5082d27dd0048bf167d04b96b9f2aad1 fbf57db49db49643897d14cd89d7ba14e96a4fbd 16 d20d07b60ff785d718b47837f1915dbe0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 read-write
The format differs from MD5, which is usually used in Cisco systems, isnt it? We need to find out what encryption (hashing) algorithm is being applied here.
So, the record format looks as follows:
config mgmtuser add encrypt
where:
is the username; is the encryption type. If == 0, then encryption is not used and contains the hex-encoded password. If == 1, then the password is encrypted with AES-128 in CBC + PKCS#7 padding mode using the constant key 834156F9940F09C0A8D00F019F850005; is the hex-encoded initialization vector for AES-CBC (16 bytes); is the hex-encoded HMAC-SHA1 (20 bytes) calculated using the constant key 44C60835E800EC06FFFF89444CE6F789. During HMAC calculation, they sequentially hash number 1 (as DWORD), (16 bytes) and ( bytes). DWORD endianness depends on the processor architecture (it can be big-endian or little-endian); is the length of data structure containing the password; - is the hex-encoded data that contain the password. To store the encoded data, multiple zero characters are added for some reason;
is the account type. It can be read-only, read-write, and lobby-admin.
It is worth mentioning that this storage format is used not only for account passwords, but for other passwords and secrets, too.
Below are given some sample templates that can precede the fields
config local-auth method fast server-key encrypt
config mgmtuser add encrypt *
config radius auth add encrypt * * * password
config wlan security * akm * set-key * encrypt
transfer * encrypt password
Thus, if we have the configuration file of a Cisco WLC device, we can obtain and restore all encrypted passwords.
To avoid disclosure of account passwords, you should always encrypt configuration files with built-in Cisco WLC tools when transferring such files to an external server (see figure below).
Watch yourself ;)
Available link for download