Pages

Friday, November 26, 2010

Security Flaw on P1 DV 230 WiMAX Modem allows WiFi Stealing


P1′s DV 230 WiMAX Modem is one of the first WiMAX with WiFi modem that’s easy to use thanks to its simple plug and play approach. The only technical bit for the user is to enter the predefined WEP password which is uniquely customised for each USB WiFi Module.

It looks all good and dandy but there’s just one small problem. We found out that the “unique” WEP password isn’t that unique after all.

If you’ve seen or used one of these, you will notice that they will give a randomised Wireless Access Point name or SSID such as 07D24A and followed by a long WEP password such as 7D24A1FFB0. Sure, you think that this is all safe but recently it was brought to our attention that there’s a simple flaw with the way they created these unique WEP passwords.

How to access your neighbour’s default unconfigured P1 DV 230 Modem?

After reading up some postings online and comparison with our own, we’ve discovered a similar pattern in all P1 DV 230 modems. Here’s how you get the WEP Password from the SSID:

  1. Get the SSID. e.g. 02B92C
  2. Remove the first character. (02B92C -> 2B92C)
  3. Add 1FFB0 (Zero not the letter O) (WEP Password: 2B92C1FFB0)

Easy, isn’t it? By default, most P1 customers would just switch on the modem and surf away without any need of changing the password. Therefore, it is highly likely that anyone can scan their WiFi and search for a SSID that contains 6 random numbers which is most probably a P1 WiFi modem. With the technique above, anyone can access a default P1 DV 230 modem without much restriction.

We’re surprised that P1 didn’t actually randomised the WEP Passwords and to add more insult to the injury, P1 also didn’t also put much effort in educating its customers on the need of changing their WEP password for security reasons.


No comments:

Post a Comment