Exploit that gives remote access affects ~200 million cable modems (ars technica)
Exploit that gives remote access affects ~200 million cable modems (ars technica)
Posted Jan 14, 2020 15:40 UTC (Tue) by Wol (subscriber, #4433)In reply to: Exploit that gives remote access affects ~200 million cable modems (ars technica) by marcH
Parent article: Exploit that gives remote access affects ~200 million cable modems (ars technica)
That's an RFC1918 address, used all the time for NAT'ing, so yes that appears to be the address the modem uses to talk to the home subnet!
Different modems/routers may play with the 3rd octet - it's often 0 or 1, and play with the 4th octet - it's usually 1 or 254, but you can pretty much guarantee on finding your modem or router at that address from your local device. Probably why security-conscious users change the 3rd octet to something random if they can.
Cheers,
Wol
Posted Jan 16, 2020 15:42 UTC (Thu)
by johnjones (guest, #5462)
[Link]
the ISP normally will be responsible for supplying the Modem and if you are unable to patch it under EU law they might well be liable for damages...
Posted Jan 20, 2020 1:17 UTC (Mon)
by dcoles (subscriber, #80488)
[Link]
Somewhat surprisingly, it's actually the people who use the *same* prefix (i.e. 192.168.100.x) that are "safe" with this particular exploit.
To understand why, look at how a typical NAT router + cable modem are set up:
[Computer] -- [NAT Router] -- [Cable Modem] -- [Internet]
Your Cable Modem bridges traffic between your ISP ("The Internet") and your NAT Router, so typically is completely transparent at the IP layer. However it still controls all traffic in/out of your network.
When you try and connect to 192.168.100.1 (and not using 192.168.100.x for your LAN), your computer sends traffic to the default route (the NAT Router, e.g. 192.168.1.1) because it knows this address isn't reachable on the local subnet. Your NAT router will dutifully forward this packet towards it's default route (your ISP) where it is intercepted and handled by the Cable Modem.
Your NAT router rewrites the source address of the packet (e.g. 192.168.1.10), but leaves destination addresses untouched (even if they're RFC 1918 "private" addresses). This is totally legal to do (and many ISPs that use "carrier grade NAT" rely on this), so long as these addresses don't leak out onto the wider "public Internet".
So what happens if your LAN *does* use the same prefix as 192.168.100.1?
Well, in this case your computer thinks that the address should be reachable on the local subnet, thus will never send these packets to the NAT router, thus making the Cable Modem's address unreachable and preventing you from being vulnerable to this exploit.
Broadcom33xx SoC
Exploit that gives remote access affects ~200 million cable modems (ars technica)