Skip to main content
High May 22, 2014

Huawei HG8245 / HG8247 WPA Generator

Huawei HG8245 & HG8247 ONT (firmware version V1R006C00S100) rely on a weak algorithm to calculate the WPA keys, keys can be predicted easily using the WiFi's MAC Address (BSSID).

CVSS Score

7.4 / 10.0

Severity

High

CVSS Vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N

Advisory

DevicesHuawei HG8245, Huawei HG8247
Hardware130C4600
SoftwareV1R006C00S100
ImpactDefault WPA pre-shared key is predictable from the BSSID

Description

The factory WPA pre-shared key on these ONTs is an eight-character string derived entirely from the device's MAC address (BSSID), which is broadcast in every beacon frame. Anyone within Wi-Fi range can recover the MAC address passively, compute the key, and join the network.

Key Derivation

Given a BSSID such as 00:46:4B:D3:CE:5F, the eight-character WPA key is built as follows:

  1. Characters 1–2: the fourth pair of the BSSID — D3.
  2. Characters 3–4: the fifth pair of the BSSID, decremented by 1 if the last pair of the BSSID is less than 0x08; otherwise unchanged. Rolls from 00 to FF.
  3. Character 5: the first character of the fifth BSSID pair, decremented by 1 if the second character of the last pair is less than 0x08; otherwise unchanged.
  4. Character 6: the second character of the last BSSID pair, remapped by a fixed substitution table (8→F, 9→0, A→1, B→2, …, 7→E).
  5. Characters 7–8: the first pair of the BSSID, remapped by a fixed lookup table (e.g. 00→0D, 28→03, 08→05, 80→06, E0→0C, CC→12, …).

For the BSSID above the resulting key is D3CE560D. A second worked example with BSSID E0:24:7F:E5:80:01 yields E57FF80C.

Recommendation

Replace the factory WPA key with a long random passphrase immediately after provisioning. ISPs redistributing these units should avoid shipping them with the default BSSID-derived key.

Remediation

Change the default WPA pre-shared key to a value not derived from the BSSID.

Share this advisory:

Related Security Advisories

Stay informed about other recent vulnerabilities and security advisories

Critical December 18, 2014

Command Execution and Backdoor in Zhone GPON-2520

This post will describe a backdoor account found in the Zhone GPON-2520 and will provide a PoC which can be used to disable the firewall filtration rules in order to allow access to services such as ssh, telnet and ftp.

Severity:
CVSS: 9.8
View advisory
High December 19, 2013

Arbitrary Command Execution in Alcatel-Lucent I-240W-Q

The Alcatel-Lucent I-240W-Q ONT's Diagnostics page does not filter shell metacharacters in the IP address field, allowing any authenticated administrator to execute arbitrary commands as root and fully compromise the device.

Severity:
CVSS: 8.0
View advisory