Radmin Default settings vulnerability

Systems: Famatech's Radmin Remote administrator software
Vulnerable: Radmin 2.0, 2.1 or any version not properly setup or trojanized
Severity: Serious
Category: Remote administrator access
Classification: unsafe default settings
BugTraq-ID: TBA
CVE-Number:TBA
Remote-Exploit: Yes
Vendor-Url:
www.radmin.com
Author: Michael Scheidell, SECNAP Network Security www.secnap.com
Original Release Date: 09/02/2002
Re-release date: 09/25/2004
Re-release reason: large spike in scanning for port 4899, CA removes 'RADMIN/BACKDOOR'

Discussion from:
www.radmin.com

Radmin is a very fast, very powerful remote administrator server available on Win95 and above. Radmin is used by help desks and fortune 500 clients worldwide.

This software gives the user the ability to remotely monitor, control and transfer files to and from his remote client via a password protected, encrypted TCP connection. Option include remote Telnet (on WinNt and above) and fast, encrypted explorer like file transfers.

Recently, we picked up a large increase in probes for radmin default port. (Tcp port 4899) from several networks, targeting many of our clients who have never run radmin. This activity suggests an increasing frequency of port scans for this service.

If you have installed radmin using the default installation options, please read this:

By default, radmin uses a know port, TCP port 4899 for remote access. Also, if you are using password authentication only, a remote user only has to find an open TCP port 4899 and guess one word: your password.  

There could also be the possibility of an unknown exploit in radmin that could allow access without a password.

This, coupled with anti-virus vendor 'Computer Associates' including radmin in a recent anti-virus dat update as "BACKDOOR/RADMIN.2_0" forced us to re-release this alert.

If you have NOT installed radmin, please make sure that you block incoming and outgoing TCP port 4899 and investigate any computer that makes outgoing tcp port 4899 access. Scan your internal network for systems (especially laptops) that may be listening on TCP port 4899, and contact SECNAP for a free external scan of your network. (www.secnap.com/contact) put in comments section 'request free radmin backdoor scan)

Suggestions to increase security on radmin include: 
Change default port from 4899 to something else 
(change it on the REMOTE first so you can still access client)

Use ip address filtering to limit the host range if possible.
(If you know the ip address range of your remote clients you can use that to limit access)

If radmin is running on NT, Win2k or XP PRO, use WinNT options
 (requires a username AND password) or use STRONG passwords

Enable the log file and look for unknown addresses attempting to access your server.

Put radmin behind a Firewall and access via VPN.

If you have evidence of an exploit, please contact SECNAP Network Security and support@radmin.com

For more information, you can visit FamaTech's user forum:
http://forum.radmin.com/

or their FAQ: "how safe is it to use Radmin" at: http://www.radmin.com/support/faq.html#1_1

Additional information may be found at:

http://www3.ca.com/support/vicdownload/NewlyDetectedList.aspx?CID=49722
http://xforce.iss.net/xforce/xfdb/10001

SECNAP will continue to monitor this activity and release more information when available.

Credit: Michael Scheidell, SECNAP Network Security Corporation
Original copy of this report can be found at
http://www.secnap.com/security/radmin001.html

Copyright: 
Above Copyright(c) 2002, 2004, SECNAP Network Security Corporation. World rights reserved. 

This security report can be copied and redistributed electronically provided it is not edited and is quoted in its entirety without written consent of SECNAP Network Security Corporation. Additional information or permission may be obtained by contacting SECNAP Network Security at 561-999-5000

Contact SECNAP Network Security for information on latest security alerts and vulnerabilities, call 866-SECNAP.NET or click
www.secnap.com/contact .

To sign up for SECNAP Network Security Corp's first-alerts mailing list, see
www.secnap.com/lists
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值