-
Notifications
You must be signed in to change notification settings - Fork 23
/
bastille-31.stb-remote-webui.txt
53 lines (23 loc) · 1.34 KB
/
bastille-31.stb-remote-webui.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
Bastille Tracking Number 31
CVE-2017-9488
Overview
A vulnerability has been discovered that enables an attacker to remotely log into a target gateway using hardcoded credentials.
Affected Platforms:
Cisco DPC3939, firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST
Cisco DPC3941T, firmware version DPC3941_2.5s3_PROD_sey
Proof-of-Concept
Comcast residential gateways expose the web UI to incoming connections on the wan0 interface. On the wan0 interface, the web UI can be accessed with either hardcoded or generated credentials.
There are two barriers which prevent attackers from accessing this web UI:
1) The IPv6 address of the wan0 interface on a target gateway must be known.
2) The wan0 interface cannot be accessed from the public internet.
The IPv6 address can be obtained from the CM MAC (Bastille Tracking Number 30).
Test Environment:
Cisco DPC3939, firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST
Cisco DPC3941T, firmware version DPC3941_2.5s3_PROD_sey
Mitigation
There is no apparent mechanism to allow Comcast customers to control or change this behavior.
Recommended Remediation
Move to certificate-based authentication, and restrict customer gateway wan0 access so that it cannot be accessed via the Send To TV web browser feature.
Credits
Marc Newlin and Logan Lamb, Bastille
Chris Grayson, Web Sight.IO