Forum RSS Feed Follow @ Twitter Follow On Facebook

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Latest Threads
[REQUEST] Acer Nitro 5 AN515-54 BIOS Unl...
Last Post: Dudu2002
07-31-2025 02:57 PM
» Replies: 133
» Views: 69331
[REQUEST] HP Stream 13 (13-c100nm) White...
Last Post: krusic22
07-29-2025 06:42 PM
» Replies: 0
» Views: 466
Acer Aspire 7741G BIOS
Last Post: lucky42
07-28-2025 08:53 AM
» Replies: 1
» Views: 1179
[REQUEST] [AMIBIOS8] MSI MS-1731 unlock
Last Post: wololo
07-27-2025 02:07 PM
» Replies: 0
» Views: 764
REQUEST - Unlock bios for Toshiba Satell...
Last Post: SaadC50
07-27-2025 10:14 AM
» Replies: 0
» Views: 655
[REQUEST] Lenovo G500(S) (7BCNxxWW) Whit...
Last Post: Tchistiakov
07-27-2025 08:52 AM
» Replies: 566
» Views: 306186
[REQUEST] HP Envy 15-k203nl bios mod
Last Post: Maxinator500
07-26-2025 12:44 PM
» Replies: 1
» Views: 802
[REQUEST] HP Pavilion dv7-6153er - F.1B ...
Last Post: swmint
07-26-2025 08:31 AM
» Replies: 2
» Views: 5636
[REQUEST] Lenovo G580 (62CNxxWW) Whiteli...
Last Post: Rt1213
07-26-2025 06:03 AM
» Replies: 817
» Views: 398610
Soltek SL-65KIV2
Last Post: DeathBringer
07-26-2025 05:44 AM
» Replies: 20
» Views: 1828
[REQUEST] Lenovo IdeaPad 3 15ALC6 (GLCNx...
Last Post: KADCORP
07-26-2025 12:30 AM
» Replies: 11
» Views: 7128
[REQUEST] GIGABYTE G6 MF (2024) Bios Unl...
Last Post: cwaras
07-25-2025 06:14 PM
» Replies: 2
» Views: 1421
[REQUEST] Lenovo Thinkpad E130 (H4ETxxWW...
Last Post: Dudu2002
07-25-2025 01:55 PM
» Replies: 495
» Views: 191802
[REQUEST] Acer Aspire VN7-791(G) BIOS Un...
Last Post: Dudu2002
07-25-2025 01:48 PM
» Replies: 93
» Views: 92917
[REQUEST] Lenovo Z410 & Z510 (8DCNxxWW) ...
Last Post: oleg-kv
07-25-2025 01:43 PM
» Replies: 501
» Views: 218148
BA92-10824B P04RAC phoenix bios rom requ...
Last Post: thi
07-25-2025 04:11 AM
» Replies: 0
» Views: 1216
[REQUEST] Acer Aspire 5742(G,Z) BIOS Unl...
Last Post: men92
07-24-2025 08:38 AM
» Replies: 166
» Views: 58592
[REQUEST] Lenovo Legion T5 (O54KT1DA) BI...
Last Post: kutoramo
07-24-2025 07:34 AM
» Replies: 1
» Views: 2003
[REQUEST] Unlocking / Enabling WoL for A...
Last Post: StarFluxGames
07-23-2025 06:23 AM
» Replies: 0
» Views: 1172
[REQUEST] Lenovo G510 (79CNxxWW) BIOS Un...
Last Post: Dudu2002
07-23-2025 02:47 AM
» Replies: 80
» Views: 60546

Caswell CAR-2051 (SPI Flash) - Admin BIOS password
#1
Greetings everyone,

a newcomer on BIOS-Mods forum, though far from being a stranger ... been following forum posts on and off for well over a decade.

DISCLAIMER: I do apologize in advance, if I failed to post in appropriate BIOS-Mods forum section (seemed just about right). Likewise, have mercy if you encounter any improper use of the term "BIOS" in the given context, or any incorrect references to AMI BIOS platform/family and version.

So here's the challenge that inspired my post - a couple of months ago I got an Atom C2000 platform networking appliance - Lancom R&S UF300 (a.k.a Gateprotect GPA-300v2), essentially a custom modified Caswell CAR-2051 with CAPB-2051 board and Atom C2558 CPU. Bare metal Caswell CAR-2051 appliances seldom show up on the second hand market, for not being designated for consumer market. There's absolutely no documentation for this EOL device available on Caswell's website, nor any downloads for BIOS updates, Intel AVR54 Bug status updates, no drivers, nothing. Try Googling "CAR-2051", you'll get something like 3-4 relevant hits at best.

A device was preloaded with Lancom R&S UTM software (expired license), so I opted to install a serial image of pfSense (no VGA on this one, just RJ45 Console port), by taking out SSD and installing pfSense, having SSD hooked to the board in my desktop PC. The pfSense install was successful, works without a hitch on CAR-2051. Still, I wasn't happy about the fact that I couldn't access the BIOS settings - the default <TAB> key for serial console BIOS Setup access didn't work, which meant that serial port console redirection must have been disabled in BIOS. That's a customized setting, commissioned by Lancom R&S, as the CAR-2051 User Manual implies that it should be "Enabled" by default. Just to be clear - I was getting the console output (running minicom terminal emulator on laptop), but only after OS bootloader would take over the boot process. So I hooked the console cable to the internal COM port header, just to check if port redirection is "Enabled" for "COM1", and ... voila!  - got the pre-boot environment on the screen, showing BIOS splash and prompt, and this time the <TAB> key was working ... until the BIOS password login window smacked me in the face.

I contacted Lancom, then R&S Cybersecurity, but none of them was keen to help, if I don't count the officially unavailable CAR-2051 User Manual, subsequently sent by R&S tech guy ("off the record" courtesy). I begged and moaned for either a factory set BIOS Administrator password or the original unmodified BIOS file, but all the pleas were to no avail. As a last resort I decided to contact the "source"; I knew from before that Caswell was not offering B2C level of customer support (as a rule of thumb), but I had nothing to lose. After third attempt I finally heard from them, but their answer was pretty much as expected ... "contact Lancom or R&S Cybersecurity, as we only cater for 2B2 businesses ...". Oh well, nothing new under the sun, been there countless times before. I was persistent though, politely of course, and it paid off - a Caswell tech guy sent me the original, unmodified CAR-2051 BIOS .bin file. In retrospect - it was a blessing with a hitch ... I was told that the serial port redirection on COM0 was "Enabled" (that's the front panel RJ45 Console port), but I was also advised that BIOS Administrator password was "Enabled" (can't fathom why, if it's "bare metal" BIOS file...), same as in Lancom R&S modified BIOS in my appliance. I didn't want to sound ungrateful and complain about it, but the thought did cross my mind ... "what's the point of having the serial port redirection on primary COM, if I can't get into BIOS (?!)".

While waiting for a batch of empty SPI Flash SOP8 chips (Winbond 25Q64FVSIG) and SOP8-DIP8 adapter to arrive (I have a Batronix BX40 external USB programmer), purchased as it didn't seem prudent to attempt flashing the original SPI Flash with the file I got from Caswell, risking to brick otherwise perfectly functional device, I've been jumping through hoops to remove that BIOS admin password on my own. Here's the summary of my efforts:

- Tried all the CMOS reset recipes in existence (removing battery - half an hour, then classic CMOS reset jumper method ...), but none of them worked.

- It did occur to me to try out the cmospwd tool, but to be honest - I was and still am questioning it's magic. If things were so simple, BIOS-es would be hacked remotely for fun by the bad guys.

- Installed headless Ubuntu Server on another SSD, which is what I currently use in my CAR-2051 appliance, just to have an access to various BIOS tools that are either loosely supported or not even available for FreeBSD.

- Ran dmidecode command, which gave me lots of hints about onboard BIOS ("CAR-2051_dmidecode.txt" file in attachment). It appears to be AMI Aptio platform (see "CAR‐2051 BIOS_printscreen.png"), BIOS revision 5.6. That would be Aptio V, if I'm not mistaken, ran on CAR-2051 in Legacy mode, but is otherwise UEFI 2.3 compliant. I'd like to note that "ROM Size" reported by dmidecode is 6 MB, while current BIOS (backup made with flashrom) and the one I got from Caswell are both 8 MB.

- Backing up the existing BIOS with flashroom tool was a real pain; the tool refused to execute even the basic flashrom --programmer internal command (to identify BIOS chip), complaining about incorrect SMBIOS tables and warning me that I may have an unsupported laptop, which required a modified version of command: [font=DejaVu Sans<br />      Mono]flashrom --programmer internal:laptop=this_is_not_a_laptop[/font]. After running the modified command, BIOS chip was identified ("W25Q64.V"), but I still couldn't read BIOS and save its content to a file ("Warning: SPI Configuration Lockdown activated.", followed by "Reading flash... FAILED"). Then I remembered there was an "SPI Flash Descriptor Security Override" jumper header on CAR-2051 board (JP3, open by default). I put a jumper on it, then flashrom finally agreed to read BIOS content and save it to a file, albeit still complaining about "SPI Configuration Lockdown activated".

- I examined two .bin files - the one I retreived from onboard BIOS with flashrom, and the one I got from Caswell - with AMIBCP tool on Win XP 64-bit PC (as I couldn't find a reliable source for Linux version of AMIBCP). Everything looks fine there - no gibberish text in the Settings menus, all menus displayed as expected (according to printscreens in the CAR-2051 User Manual), all settings - Optimal and Failsafe - set to DEFAULT. I did try to search for the strings, that would give me a hint about the set Administrator password, but I couldn't find aynthing. Either password is stored somewhere else (the Caswell guy claims it's on BIOS, definitely not on TPM module, which I removed...), or I don't see all the BIOS regions with AMIPCB tool. On the "Setup Configuration" tab there are "Setup", "Recovery" and "IntelRCSetup" parent folders; the "Setup" folder contains a "Security" subfolder, with settings for "Admisitrator" and "User" passwords (all values set to DEFAULT). That's it, there's absolutely nothing related to ME region and SPI Flash Descriptor protection settings.

I haven't heard from that Caswell tech guy ever since, as if my short lived pro-bono unofficial B2C courtesy has expired ... in the blink of an eye. The way I see it, even if I do everything right with the AMIBCP tool (all the right settings changed to USER, on all the relevant PARENT and CHILD levels), then flash successfully the empty SPI Flash with an external programmer, I'll be still hitting the wall for not having the admin BIOS password. I'm hoping to generate some interest on this forum, in case anyone is keen to have a go at "cracking the nut" - finding/extracting the Administrator password from Lancom R&S BIOS .bin file (I'll provide the Caswell BIOS .bin version as well, if requested), or ... offering a fresh approach at disabling it. I reckon that all the relevant files are in attachment, but I'll gladly provide whatever is missing.

Kind regards,
Bostjan


Attached Files Thumbnail(s)
   

.txt   CAR-2051_dmidecode.txt (Size: 15.37 KB / Downloads: 0)
.txt   flashrom_read_JP3_open.txt (Size: 364 bytes / Downloads: 0)
.txt   flashrom_read_JP3_closed.txt (Size: 1.68 KB / Downloads: 0)
.bin   CAPB-2051_Lancom_R&S.bin (Size: 8 MB / Downloads: 2)
find
quote


Forum Jump:


Users browsing this thread: 1 Guest(s)