Tuesday, July 26, 2016

50+ vulnerabilities found in popular home gateway modems/routers

Researcher Gergely Eberhardt with Hungarian security testing outfit SEARCH Laboratory has unearthed over fifty vulnerabilities in five home gateway modems/routers used by Hungarian Cable TV operator UPC Magyarország, but also by many ISPs around the world.

The devices in question are Ubee EVW3226, Technicolor TC7200, Cisco EPC3925, Hitron CGNV4, and Compal CH7465LG-LC.

home gateway modems vulnerabilities

The security of some of them have been evaluated for mere hours, and others for 2 days or two weeks, but the “final” cross section of found vulnerability types is as follows (the “bomb” means that at least one vulnerability was found, and the “check mark” that the correct protection measure was applied).

As you might have noticed, three of the five tested devices used default SSIDs and passphrases for the user’s WiFi network, and they were generated from publicly known identifiers. And even with that knowledge, these passphrases can be brute-forced with lightning speed.

The testing of the devices was started by the company independently, but after they notified UPC Magyarország and its mother company Liberty Global of some of the vulnerabilities found, it continued with their blessing and help (they provided samples of Compal CH7465LG-LC modems).

And earlier this year, UPC Magyarország sent out repeated warnings to end users about the importance of changing the default passphrases.

The rest of the vulnerabilities have to be fixed with a firmware update from the device manufacturers, and the update pushed out by the ISP.

PoC scripts for the exploitation of some of the bugs have been provided through Eberhardt’s GitHub repository, some PoC code is also included in the separate advisories (1, 2, 3, 4, 5).


from Help Net Security http://ift.tt/2adHKgJ

No comments:

Post a Comment