Overview
Multiple models of ARRIS cable modems contain multiple, deterministically generated backdoor passwords, as well as multiple cross-site scripting (XSS) and cross-site request forgery (CSRF) vulnerabilities.
Description
CWE-255: Credentials Management - CVE-2009-5149 The 'password of the day' for multiple models of ARRIS cable modems is generated using a publicly known algorithm. A remote attacker with knowledge of the algorithm, the date, and the seed can gain technician access to the device.
The following firmware versions were reported as being vulnerable:
Additional models and firmware versions may also be affected. Shodan search results show that many devices are accessible on the public Internet through telnet, SSH, or web management. An attacker with access to the web management interface and the technician password or SNMP can enable telnet and SSH. Logging as technician using the 'password of the day' provides a restricted mini_cli shell. This shell can be can be escaped to a full BusyBox shell; logging in using the hard-coded password provides the BusyBox shell. It has been reported that these vulnerabilities, particularly the hard-coded passwords, are currently being exploited. For additional details, refer to the researcher's disclosure. |
Impact
An attacker with access to the web management interface and knowledge of the password-generation algorithm and seed may be able to gain technician or administrative access to devices. A remote attacker may also perform actions with the same permissions of a victim user, or execute arbitrary scripts in the context of the user's browser. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem. |
Change 'password of the day' seed |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P |
Temporal | 6.8 | E:POC/RL:U/RC:C |
Environmental | 6.7 | CDP:ND/TD:H/CR:ND/IR:ND/AR:ND |
References
- https://w00tsec.blogspot.com/2015/11/arris-cable-modem-has-backdoor-in.html
- https://github.com/borfast/arrispwgen
- https://www.shodan.io/search?query=arris+port%3A%2223%22
- https://www.shodan.io/search?query=SSH-2.0-ARRIS_0.50
- https://www.shodan.io/search?query=net-dk
- http://www.theregister.co.uk/2015/11/20/arris_modem_backdoor/
- http://www.cert.br/docs/palestras/certbr-tcfirst2015.pdf
- https://www.exploit-db.com/exploits/29131/
- http://docsis.org/node/1575
- http://cwe.mitre.org/data/definitions/255.html
- http://cwe.mitre.org/data/definitions/259.html
- http://cwe.mitre.org/data/definitions/80.html
- http://cwe.mitre.org/data/definitions/352.html
Acknowledgements
Thanks to Bernardo Rodrigues for reporting this vulnerability.
This document was written by Garret Wassermann.
Other Information
CVE IDs: | CVE-2009-5149, CVE-2015-7289, CVE-2015-7290, CVE-2015-7291 |
Date Public: | 2015-11-20 |
Date First Published: | 2015-11-20 |
Date Last Updated: | 2015-11-23 19:38 UTC |
Document Revision: | 68 |