Cable Haunt lets attackers take complete control when targets visit booby-trapped sites.
Read the whole story
Read the whole story
If I understand what you're saying correctly...yes, they do exist, mine is like that. It has it's own IP address (well, it should anyways...the router doesn't always play nice with the IP it assigned itself, so it only works sometimes), and that IP address gives you access to a webpage with some config and stats for the modem.So if my modem is configured in bridge mode and doesn't HAVE an IP address, then I'm not vulnerable tot his attack?
From https://cablehaunt.com/
"What About Modems in Bridge Mode, or Behind a Firewall?
It is hard to say across all models, if the vulnerable endpoint is available when operating in bridge mode. We have however received several reports from individual users across the world, where the modem was still vulnerable even in bridge mode, so this is definitely not a security guarantee. If your modem is running behind a separate router/gateway, you might be safe by configuring a firewall restriction on the spectrum analyzer. In any case, it is a decent mitigation strategy, while waiting for your ISP to roll out deployments."
Seems a bit like non-answer, they really don't want to say that bridge mode is not vulnerable, although logically it shouldn't be.
I'm wondering if there are cable modems which have a local management interface that is separate from the main WAN ethernet interface. If so, then those might have a local IP and still be vulnerable. I'm not familiar with any cable modems that operate that way but many other types of devices have separate management interfaces, so I think it would be possible.
Yes, that's possible. Your router should not be routing packets sent to a private network to it but you can explicitly block them anyway.My Comcast provided modem is in bridge mode but still has an IP address. The article doesn’t provide mitigation steps but wouldn’t it be possible to block egress to the modem IP address at the router? That would prevent machines on the LAN from being able to successfully execute the attack, no?
What am I missing Ars?
While never a bad idea, do keep in mind that cable modem firmware updates only happen through your ISP as far as I know.I'm not affected but this is a good reminder I need to check my networking hardware for firmware updates.
It creates a bit of a hairy situation where if you bring your own hardware (vs paying a monthly equipment rental fee) and your ISP doesn't support it, it'll never see a firmware update.
So like the RUST language?Would not having Java installed (or enabled) protect you from this vulnerability?
Java != JavaScript.
I know we're decades into the mess, but it was dumb to make the names of such radically different programming languages so similar. Doubly so since I'm pretty sure it was on purpose.
blame Netscape The browser itself is basically dead, but its legacy lives on in the form of Javascript. (FYI as far as I know, JS was never designed to be secure, but rather the security (such as it is) comes from running in a theoretically secure sandbox). Then again, IS there any mainstream programming language that WAS designed for security?
(edit : corrected incorrect contraction)
If the modem suddenly has no ip address in bridge mode, how would you access it to drop it out of bridge mode?Would be good to have some article clarification if possible, but it does sound like the attack depends on a client LAN device being able to directly connect in some way the modem. If so anything that interferes with that would prevent it. Note though that even in bridge mode some modems do still have an IP address (albeit potentially on a different subnet), depending on the model and firmware. If you know yours doesn't then that should be that, but don't assume either.So if my modem is configured in bridge mode and doesn't HAVE an IP address, then I'm not vulnerable tot his attack?
Yes, that's possible. Your router should not be routing packets sent to a private network to it but you can explicitly block them anyway.My Comcast provided modem is in bridge mode but still has an IP address. The article doesn’t provide mitigation steps but wouldn’t it be possible to block egress to the modem IP address at the router? That would prevent machines on the LAN from being able to successfully execute the attack, no?
What am I missing Ars?
Hrm. From the sound of it, the attack won't work if the cable modem is simply not addressable at all from the LAN? I manage the internet for an elderly relative, and they do have cable internet since that's the only thing available there. However, when I set them up I used what at the time was my standard setup: basic cable modem in pure modem mode <> Unifi Security Gateway <> Switch <> WAPs. The USG is the effective edge of the LAN, being a NAT and handling DNS/VLAN L3 routing and all that, and in fact one frustrating long standing irritation (that Ubiquiti at one point said they'd fixed, before the company went to shit) is that there is no standard way to access a modem config page or anything else through the USG without a bunch of manual work, which I never bothered with. Seems like that might be a bullet dodged here though, if the attack requires essentially bouncing off a LAN device to the cable modem than anything that interfered with that would stop it right? Seems like if devices were isolated on VLANs as well. It's too bad consumer networking has never put a better GUI on VLAN usage, isolating different classes of devices on networks is super useful anyway (not even just for security, VoIP and the like tends to be a lot happier without anything else buzzing around its subnet).The first and most straightforward way is to serve malicious JavaScript that causes the browser to connect to the modem. Normally, a mechanism called cross-origin resource sharing prevents a Web application from one origin (such as malicious.example.com) from working on a different origin (such as 192.168.100.1, the address used by most or all of the vulnerable modems).
Websockets, however, aren't protected by CORS, as the mechanism is usually called. As a result, the modems will accept the remote JavaScript, thereby allowing attackers to reach the endpoint and serve it code. While Cabe Haunt accesses modems through a browser, the attack can come from any place where running code can reach an IP on the local network.
Rebinding attacks, ROP, and more
The attack doesn't work when vulnerable targets use Firefox, because the websocket used by that browser isn't compatible with the websocket used by the spectrum analyzer. Attackers can still carry out their remote attack by using JavaScript that carries out what's known as a DNS rebinding attack. To bypass the same origin policy—a restriction that prevents code served from one domain from executing on a different domain—the rebinding attack manipulates DNS tables inside the local network. Because the attack site's domain address is mapped to the IP of the vulnerable modem, the JavaScript will execute the attack code successfully.
Reset to factory settings. At least that's how the last DSL modem I had use to work in that case.If the modem suddenly has no ip address in bridge mode, how would you access it to drop it out of bridge mode?Would be good to have some article clarification if possible, but it does sound like the attack depends on a client LAN device being able to directly connect in some way the modem. If so anything that interferes with that would prevent it. Note though that even in bridge mode some modems do still have an IP address (albeit potentially on a different subnet), depending on the model and firmware. If you know yours doesn't then that should be that, but don't assume either.So if my modem is configured in bridge mode and doesn't HAVE an IP address, then I'm not vulnerable tot his attack?
Bridge mode means it extends the dhcp addressing scheme it finds itself in. Not this magical security stuff you suspect it of. If you are looking for the thing without an IP address then that is your Ethernet cable and maybe a PoE injector.
The script is using WebSockets to connect to the modem, so it needs a TCP connection, which in turn needs packets to move both ways to get established. So dropping in either direction should work.Hrm. From the sound of it, the attack won't work if the cable modem is simply not addressable at all from the LAN? I manage the internet for an elderly relative, and they do have cable internet since that's the only thing available there. However, when I set them up I used what at the time was my standard setup: basic cable modem in pure modem mode <> Unifi Security Gateway <> Switch <> WAPs. The USG is the effective edge of the LAN, being a NAT and handling DNS/VLAN L3 routing and all that, and in fact one frustrating long standing irritation (that Ubiquiti at one point said they'd fixed, before the company went to shit) is that there is no standard way to access a modem config page or anything else through the USG without a bunch of manual work, which I never bothered with. Seems like that might be a bullet dodged here though, if the attack requires essentially bouncing off a LAN device to the cable modem than anything that interfered with that would stop it right? Seems like if devices were isolated on VLANs as well. It's too bad consumer networking has never put a better GUI on VLAN usage, isolating different classes of devices on networks is super useful anyway (not even just for security, VoIP and the like tends to be a lot happier without anything else buzzing around its subnet).The first and most straightforward way is to serve malicious JavaScript that causes the browser to connect to the modem. Normally, a mechanism called cross-origin resource sharing prevents a Web application from one origin (such as malicious.example.com) from working on a different origin (such as 192.168.100.1, the address used by most or all of the vulnerable modems).
Websockets, however, aren't protected by CORS, as the mechanism is usually called. As a result, the modems will accept the remote JavaScript, thereby allowing attackers to reach the endpoint and serve it code. While Cabe Haunt accesses modems through a browser, the attack can come from any place where running code can reach an IP on the local network.
Rebinding attacks, ROP, and more
The attack doesn't work when vulnerable targets use Firefox, because the websocket used by that browser isn't compatible with the websocket used by the spectrum analyzer. Attackers can still carry out their remote attack by using JavaScript that carries out what's known as a DNS rebinding attack. To bypass the same origin policy—a restriction that prevents code served from one domain from executing on a different domain—the rebinding attack manipulates DNS tables inside the local network. Because the attack site's domain address is mapped to the IP of the vulnerable modem, the JavaScript will execute the attack code successfully.
Maybe. If packets out from the LAN to 192.168.100.1 are dropped and never reach the modem, the usual attack vectors will be rendered impotent. If the problem is instead that replies are being dropped, the sample code will fail, but it would be relatively straightforward to adapt the payload to work despite the lack of feedback, at the cost of greater complexity in the delivery mechanism, which could make it more easily detectable by the browser.
There is an 'l' missing from 'Cabe' in the last sentence before the 'Rebinding attacks, ROP, and more' heading.While Cabe Haunt accesses modems through a browser, the attack can come from any place where running code can reach an IP on the local network.
The script is using WebSockets to connect to the modem, so it needs a TCP connection, which in turn needs packets to move both ways to get established. So dropping in either direction should work.Hrm. From the sound of it, the attack won't work if the cable modem is simply not addressable at all from the LAN? I manage the internet for an elderly relative, and they do have cable internet since that's the only thing available there. However, when I set them up I used what at the time was my standard setup: basic cable modem in pure modem mode <> Unifi Security Gateway <> Switch <> WAPs. The USG is the effective edge of the LAN, being a NAT and handling DNS/VLAN L3 routing and all that, and in fact one frustrating long standing irritation (that Ubiquiti at one point said they'd fixed, before the company went to shit) is that there is no standard way to access a modem config page or anything else through the USG without a bunch of manual work, which I never bothered with. Seems like that might be a bullet dodged here though, if the attack requires essentially bouncing off a LAN device to the cable modem than anything that interfered with that would stop it right? Seems like if devices were isolated on VLANs as well. It's too bad consumer networking has never put a better GUI on VLAN usage, isolating different classes of devices on networks is super useful anyway (not even just for security, VoIP and the like tends to be a lot happier without anything else buzzing around its subnet).The first and most straightforward way is to serve malicious JavaScript that causes the browser to connect to the modem. Normally, a mechanism called cross-origin resource sharing prevents a Web application from one origin (such as malicious.example.com) from working on a different origin (such as 192.168.100.1, the address used by most or all of the vulnerable modems).
Websockets, however, aren't protected by CORS, as the mechanism is usually called. As a result, the modems will accept the remote JavaScript, thereby allowing attackers to reach the endpoint and serve it code. While Cabe Haunt accesses modems through a browser, the attack can come from any place where running code can reach an IP on the local network.
Rebinding attacks, ROP, and more
The attack doesn't work when vulnerable targets use Firefox, because the websocket used by that browser isn't compatible with the websocket used by the spectrum analyzer. Attackers can still carry out their remote attack by using JavaScript that carries out what's known as a DNS rebinding attack. To bypass the same origin policy—a restriction that prevents code served from one domain from executing on a different domain—the rebinding attack manipulates DNS tables inside the local network. Because the attack site's domain address is mapped to the IP of the vulnerable modem, the JavaScript will execute the attack code successfully.
Maybe. If packets out from the LAN to 192.168.100.1 are dropped and never reach the modem, the usual attack vectors will be rendered impotent. If the problem is instead that replies are being dropped, the sample code will fail, but it would be relatively straightforward to adapt the payload to work despite the lack of feedback, at the cost of greater complexity in the delivery mechanism, which could make it more easily detectable by the browser.
https://www.spectrum.net/support/intern ... r-network/Well, shit. I forewent the ISP modem.
If you're using a modem supported by the ISP, they'll generally push firmware updates to it. I know from experience (when they push an update at 2 AM while I'm binge watching some show on Netflix...lol.)
I don't know. It was the Wirecutter's pick at the time, an Arris something-or-other but I doubt I could expect a straight answer from Spectrum about whether my modem is supported.
I have a Netgear which will respond to packets sent to 192.168.100.1 on its LAN interface even when it is in bridge mode. So just bridge mode is not enough, you may need to block traffic to 192.168.100.1 on your router (although it should not be routing 192.168.0.0/16 to it WAN interface anyway).
That’s what I ended up doing on my Orbi, though I routed it to a non-existent IP on my LAN instead (since it wouldn’t let me configure a null route). I also took steps to mitigate DNS rebinding attacks by updating my internal DNS server (Unbound in a container running on a Raspberry Pi) to filter out responses with private and reserved IP addresses.For mitigation, blocking via firewall rules didn't appear to work on my ASUS router. It still happily routed to my modem in bridge mode.
The only thing I could get to work was enable and define a static route. That prevents any internal client from being able to access the modem's config page and all pings to the modem return destination unreachable. Switching the static route toggle allows access to the modem config page if needed.
On ASUS routers, it's LAN page, route tab
Network: Modem IP (ex. 192.168.0.1, 10.0.0.1, etc)
Netmask: 255.255.255.255
Gateway: Router LAN IP
I have no idea how to update the firmware on my cable modem, which was supplied and configured by my cable provider :-\I'm not affected but this is a good reminder I need to check my networking hardware for firmware updates.
I have no idea how to update the firmware on my cable modem, which was supplied and configured by my cable provider :-\I'm not affected but this is a good reminder I need to check my networking hardware for firmware updates.
You can’t update your modem’s firmware. Only the ISP can do it. If it’s an officially supported modem, they should update it eventually.Greaaaat. And since I decided to cheap out and buy my own modem ($40 once vs. $10/month to CableVision), **I'm** the person I have to contact to find out if my modem's vulnerable, and/or if there's a firmware patch.
Hopefully TP-LINK's after-sales support is better than their pricing would seem to imply.
Well, shit. I forewent the ISP modem.
If you're using a modem supported by the ISP, they'll generally push firmware updates to it. I know from experience (when they push an update at 2 AM while I'm binge watching some show on Netflix...lol.)
I don't know. It was the Wirecutter's pick at the time, an Arris something-or-other but I doubt I could expect a straight answer from Spectrum about whether my modem is supported.
Everything in this article states that 'modems' are impacted. Reading into the detail - the devices that are impacted are either ISP supplied or personally purchased modem/router combo units - not stand alone modems (Motorola MB7220 as example of a stand alone modem).
Further, I've never seen ANY of these modems mentioned in the article here in the US. Has anyone else?
Further, I've never seen ANY of these modems mentioned in the article here in the US. Has anyone else?
Everything in this article states that 'modems' are impacted. Reading into the detail - the devices that are impacted are either ISP supplied or personally purchased modem/router combo units - not stand alone modems (Motorola MB7220 as example of a stand alone modem).
Is that based on anything concrete, or is it just that the only devices _reported_ vulnerable by the researchers all happen to be combo units? Because, any modem will have a spectrum analyzer, and most modems also listen on 192.168.100.1. I know mine does.
Sure, EXPLOITING a dumb modem may not be as profitable, since I doubt you could bring one into a botnet's fold in any meaningful way. But if the exploit is feasible then I'd still like to button mine up, because somebody will hack them anyway.
Spectrum Analyzers are used specifically in wireless communications (I am not saying they are NOT used in other technologies). Each device listed had wireless capabilities (ie. was a combo unit).
I'm not affected but this is a good reminder I need to check my networking hardware for firmware updates.
So basically all the cg3xxx series have been pawned by one exploit or another?
Well, shit. I forewent the ISP modem.
If you're using a modem supported by the ISP, they'll generally push firmware updates to it. I know from experience (when they push an update at 2 AM while I'm binge watching some show on Netflix...lol.)
I don't know. It was the Wirecutter's pick at the time, an Arris something-or-other but I doubt I could expect a straight answer from Spectrum about whether my modem is supported.
The wirecutter recommendations for cable modems suck, in my opinion. More focused on cost and simplistic methodology for forming their recommendation. Last I checked slightly over a year ago, they were recommending an Arris modem that comcast spent a lot of good money to replace as their ISP rental modem. Comcast isn't going to spend millions replacing a serviceable modem.
Here's where they messed up, but its a common mistake. They made their recommendation by multiplying modem supported up/download channels and saying a lower channel product was fine "because it supports the speed tiers". Nice, but more channels = lower chance of getting congestion induced reduced quality of service. I actually owned their recommended modem...eight years ago. I had variable pings and downloads, depending on the time of day. When busy times (7-8am, when school lets out and netflix time) came around, I was stuck with fewer channels for my modem to receive data on. Moving to a modem that cost a couple of bucks more and more channels solved it.
I often describe it as buying a nice car (what you pay a month for internet) and pushing it to save on gas (saving $20 on a cable modem).
I used to like wirecutter recommendations before they started doing it for money and they "diversified" into areas where they aren't really experts.
Further, I've never seen ANY of these modems mentioned in the article here in the US. Has anyone else?
Thanks for that information.For mitigation, blocking via firewall rules didn't appear to work on my ASUS router. It still happily routed to my modem in bridge mode.
The only thing I could get to work was enable and define a static route. That prevents any internal client from being able to access the modem's config page and all pings to the modem return destination unreachable. Switching the static route toggle allows access to the modem config page if needed.
On ASUS routers, it's LAN page, route tab
Network: Modem IP (ex. 192.168.0.1, 10.0.0.1, etc)
Netmask: 255.255.255.255
Gateway: Router LAN IP