MISC: GlobalSunTech WAP Admin Password Disclosure

This signature detects attempts to exploit a known vulnerability against GlobalSunTech Wireless Access Points (WAPs). WISECOM GL2422AP-0T, D-Link DWL-900AP+ B1 version 2.1 and 2.2, ALLOY GL-2422AP-S, EUSSO GL2422-AP, and LINKSYS WAP11-V2.2 are vulnerable. Attackers can broadcast a maliciously crafted packet that causes WAPs to disclose sensitive information such as WAP type, WAP name, Admin username, and Admin password.

Extended Description

An information disclosure vulnerability has been discovered in GlobalSunTech access points. It has been reported that a remote attacker is able to retrieve sensitive information from vulnerable access points, including AP login credentials. Information gained by exploiting this vulnerability may allow an attacker to launch further attacks against the target network. It should be noted that this vulnerability was reported for a WISECOM GL2422AP-0T access point. Devices that use Global Sun Technology access points may be affected by this issue. It has been determined that D-Link DI-614+ and SMC Barricade 7004AWBR access points are not affected by this issue. It has been reported that Linksys WAP11-V2.2 is prone to this issue, but to a lesser extent.

Affected Products

Globalsuntech wisecom_gl2422ap-0t

Short Name
APP:GTS-WAP-PASSDISC
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Admin Disclosure GlobalSunTech Password WAP bid:6100
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
UDP/27155
False Positive
Unknown
Vendors

Globalsuntech

D-link

Linksys

Found a potential security threat?