http://www.pcworld.com/article/174123/gaping_security_hole_turns_cable_m
odems_into_hacker_prey.html 

 Close <javascript:void(0);>  

Gaping Security Hole Turns Cable Modems Into Hacker Prey

A blogger helping to tune a friend's wi-fi network uncovered a gaping
security hole in Wi-Fi cable modem routers installed in 64,000 Time
Warner subscribers' homes.

Tim Greene, Network World 

Thursday, October 22, 2009 04:55 AM PDT

A blogger helping to tune a friend's wi-fi network uncovered a gaping
security hole in Wi-Fi cable modem routers installed in 64,000 Time
Warner
<https://www.networkworld.com/news/2009/073009-time-warner-cable-to-join
.html>  subscribers' homes, leaving them open to attack.

10 of the Worst Moments in Network Security History
<http://www.networkworld.com/slideshows/2008/031108-worst-moments-in-net
-security.html> 

Time Warner says that within the past week it has patched the problem
until the manufacturer can provide a permanent fix, but before that it
had allowed administrative access to the routers. Attackers could then
run a variety of programs against these routers, says David Chen in his
blog Chenosaurus <http://chenosaurus.com/2009/10/> .

Because the vulnerability let anyone anywhere on the Internet take over
control of the router, they could launch attacks from within Time Warner
customers' homes.

"From within your own network, an intruder can eavesdrop on sensitive
data being sent over the Internet and even worse, they can manipulate
the DNS address to point trusted sites to malicious servers to perform
man-in-the-middle attacks," Chen writes. "Someone skilled enough can
possibly even modify and install a new firmware onto the router, which
can then automatically scan and infect other routers automatically."

Chen says he discovered that administrative control of the routers had
been blocked by a Java script. He disabled Java on his friend's router
and had access to all the router's settings. He opened the backup
configuration file and discovered the administrative login and password
in plaintext.

He says he was able to run a port scan on Time Warner IP addresses and
found dozens of these routers that were open to attack. The router
involved is the SMC 8014 wireless router and cable modem, says Alex
Dudley, vice president of public relations for Time Warner. He says his
company is waiting for a permanent fix from SMC that Time Warner will
run quality assurance testing on before pushing it to the affected
routers.

Chen also notes that the router allows only Wired Equivalent Privacy
encryption <http://www.networkworld.com/community/node/31388> , which he
says is readily broken, allowing anyone who can break WEP access to the
network. He also says the fixed format for the routers' SSIDs makes it
possible to figure out which Wi-Fi networks are run by SMC 8014s.

 

1998-2009, PC World Communications, Inc.

   <http://www.omniture.com/> 

 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

<<image001.jpg>>

<<image002.gif>>

<<image003.png>>

Reply via email to