CPSEC-368: NetCloud OS (NCOS) Vulnerable to DNSpooq (DNSmasq)
2021-01-19 16:35:47
SUMMARY:
Cradlepoint devices running NetCloud OS (NCOS) use dnsmasq for domain resolution, domain caching and DHCP services on the local LAN. DNS is a configurable service within NCOS therefore possible configuration states and potential impacts are listed.
Public Disclosure: https://www.jsof-tech.com/disclosures/dnspooq/
Affected Components: NCOS versions up to 7.21.20
Recommendations:
- Promptly test and upgrade to the latest NCOS version upon release
- Disable (do not enable) DNSSEC until patched
- Authenticate clients to the LAN using 802.1X
- Do not configure firewall to expose DNS services (UDP port 53) on WAN interfaces
Default Configuration: DNSSEC disabled
- Cradlepoint Severity: Low/Medium (dependent upon environment)
- Potentially Impacted: Local LAN users, clients, and services
- Potential Attack Path: Local LAN
- Associated CVEs:
- CVE-2020-25684
- CVE-2020-25685
- CVE-2020-25686
Modified Configuration: DNSSEC enabled
- Cradlepoint Severity: Medium/High (dependent upon environment)
- Potentially Impacted:
- Device and sub-services
- Local LAN users, clients, and services
- Potential Attack Path: Local LAN
- Associated CVEs:
- CVE-2020-25681
- CVE-2020-25682
- CVE-2020-25683
- CVE-2020-25687
Modified Configuration: DNS services exposed on WAN
- Cradlepoint Severity: Critical (dependent upon environment)
- Potentially Impacted: See above
- Potential Attack Paths:
- WAN interfaces
- Local LAN
- Associated CVEs: See above