Exploit that gives remote access affects ~200 million cable modems (ars technica)
Exploit that gives remote access affects ~200 million cable modems (ars technica)
Posted Jan 14, 2020 15:50 UTC (Tue) by dezgeg (subscriber, #92243)In reply to: Exploit that gives remote access affects ~200 million cable modems (ars technica) by marcH
Parent article: Exploit that gives remote access affects ~200 million cable modems (ars technica)
Posted Jan 14, 2020 16:29 UTC (Tue)
by marcH (subscriber, #57642)
[Link] (6 responses)
Even if the destination MAC address doesn't match?
Like a number of other LWN readers I guess, I have bought, installed and configured my own router. Like everyone else, only my operator can upgrade the firmware on my (dumb) cable modem. I never tried to connect to my modem and the chances its IP internal address matches my subnet are very low.
So I suspect exploiting this vulnerability in this case would require _another_ vulnerability to somehow configure IP aliasing from the web browser under attack...?
The vulnerability FAQ mentions something about routers and firewalls but it's surprisingly vague. Right, I should read the detailed vulnerability description :-/
Posted Jan 14, 2020 18:00 UTC (Tue)
by dezgeg (subscriber, #92243)
[Link] (5 responses)
I don't know what happens if you enable NAT on the modem and connect a machine with that 192.168.100.1 address.
Posted Jan 14, 2020 18:56 UTC (Tue)
by marcH (subscriber, #57642)
[Link] (4 responses)
Perfect configuration for testing, thanks for sharing.
In this case packets to 192.168.100.1 should be targeted at the MAC of your "far" ISP router (default route), not to the MAC of the modem itself [*]. Can you run "arp -a" or wireshark on the system with the web browser to confirm? 192.168.100.1 should be missing from arp -a even after you just connected to it.
If confirmed missing then: yes, this modem catches packets to its IP address even when they don't have its MAC. As often, convenience decreases security.
[*] ISP router which should immediately discard them cause private subnet.
PS: I need to perform some testing on my side too...
Posted Jan 15, 2020 16:00 UTC (Wed)
by rahvin (guest, #16953)
[Link]
However they are doing it, I suspect it's done like this so they field less calls about why someone's cable modem won't respond when they type in the default address even if their network config is completely different.
Posted Jan 15, 2020 20:37 UTC (Wed)
by marcH (subscriber, #57642)
[Link]
How naive I was to think the default OpenWRT firewall rules would not forward private addresses to the WAN interface...
http://192.168.100.1 and ta-da: the most dumb-looking modem I bought isn't that dumb after all! Of course it has a web interface without any password. Of course it doesn't care what the destination MAC address is. Of course Linux doesn't care about the unexpected MAC address in the reply.
Firewall configuration: never before has so much work and complexity produced so much false sense of security[*]. Instead of simply locking the (network) doors and get some "defense in depth", leave them all open. Instead, sign a very complicated contract with an external, unreliable and SPOF security company.
To be fair that modem's interface seems read-only. Except when it's vulnerable and not.
[*] Wait, I forgot SELinux...
> I suspect it's done like this so they field less calls about why someone's cable modem won't respond when they type in the default address even if their network config is completely different.
Yes of course! Fewer field calls: more profit. Less security: who cares?
Now two somewhat better news:
- While this modem (SB6121) is at least 8 years old, the Firmware Build Time is much more recent: Apr 22 2019 (SB_KOMODO-1.0.7.3-SCM02-NOSH / 1.0.12.18m3). There is some hope.
/etc/config/firewall diff, tested
I performed a before/after iptables -L sanitycheck and it looked as expected.
Posted Jan 16, 2020 20:09 UTC (Thu)
by klossner (subscriber, #30046)
[Link] (1 responses)
This is often the only way you can connect to the cable modem to configure it.
Posted Jan 16, 2020 22:14 UTC (Thu)
by marcH (subscriber, #57642)
[Link]
According to its web interface, this SB6121 has a built in DHCP server that interestingly runs only when cable link is down (then the ISP takes over).
IP aliasing
IP aliasing
Of course if you have your own router in-between that uses 192.168.x.y space as LAN and doesn't pass those packets to the modem you should be safe.
IP aliasing
IP aliasing
IP aliasing
> ...
> PS: I need to perform some testing on my side too...
- I could add the missing firewall rule from OpenWRT's web interface in no time:
+
+config rule
+ option enabled '1'
+ option src 'lan'
+ option name 'reject private'
+ option proto 'all'
+ option target 'REJECT'
+ option dest 'wan'
+ option dest_ip '192.168.0.0/16'
+
IP aliasing
IP aliasing