Basic search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:23957
HistoryMay 28, 2010 - 12:00 a.m.

Cyberoam SSL VPN Client - Plain-text Storage of Username and Password

2010-05-2800:00:00
vulners.com
74

Cyberoam SSL VPN Client - Plain-text Storage of Username and Password

Vulnerability Summary:
Product: Cyberoam SSL VPN Client v1.0
Vendor: eLiteCore
Website: http://www.cyberoam.com/
Platform: Windows
Vulnerability Classification: Insecure Storage of User Credentials
Issue Fixed in Version: Cyberoam SSL VPN 9.6.0.78
Issue Discovered By: Wasim Halani (washal)
Organization: Network Intelligence India Pvt. Ltd.
(http://www.niiconsulting.com/)
Advisory Link: http://niiconsulting.com/vul/CyberoamSSLVPNClient.html
Date of Advisory: 26th May, 2010

Product Info:
"SSL VPN client is used for establishing remote connections in full access
mode. A remote user having an internet connection can download and install
SSL VPN Client. Once the client is installed, an encrypted tunnel is
established for secure access to the corporate network after providing user
credentials."

Vulnerability Description:
The Cyberoam SSL VPN client (CrSSL.exe) provides the user with an option to
save their credentials on the system for later use.

[IMG: http://niiconsulting.com/images/crssl-client-save-credentials.jpg ]

These details (username and password) are stored in the Windows registry
under the HKEY_CURRENT_USER hive.
The credentials are stored in plain-text in respective keys at the below
location
My Computer\HKEY_CURRENT_USER\Software\SslElite\CrSSL-Client
jalpassword=
jalusername=

[IMG: http://niiconsulting.com/images/plain-text-username-password.jpg ]

Vendor Communication:
27th October, 2009 - Vendor informed about vulnerability
28th October, 2009 - Confirmation of receipt of email
6th November, 2009 - Vendor confirms issue. To be considered a 'feature
request'.
3rd March, 2010 - Vendor informs us that the next firmware release will
fix the issue.
5th May, 2010 - Vendor confirms that the version 9.6.0.78 of the
Cyberoam SSL VPN and its corresponding SSL VPN client do not have the
vulnerability.

[IMG: http://niiconsulting.com/images/ssl-registry-fix.JPG ]

Solution:
Upgrade to the latest Cyberoam SSL VPN version of the, available on the
vendor website

Acknowledgements:
We would like to thank Mr. Rakesh Patel of eLitCore for the cooperation he
has shown in fixing the vulnerability.


Wasim Halani
Security Analyst
Network Intelligence India Pvt. Ltd.
http://www.niiconsulting.com/
Blog: http://www.niiconsulting.com/checkmate/