KSR[T] Advisories #012: Hybrid Network's Cable Modems

From: KSR[T] Contact Account (ksrtat_private)
Date: Wed Oct 06 1999 - 06:24:03 PDT

  • Next message: Rich Lafferty: "Re: MicroImages MIX X Server"

    KSR[T] Security Advisories http://www.ksrt.org
    Contact Account:           ksrtat_private
    Advisory Subscription:     Send an empty message to:
                               ksrt-advisories-subscribeat_private
    ----
    
                                                      KSR[T] Advisory #012
                                                      Date:  Oct.  6  1999
                                                      ID #:  hybr-hsmp-012
    
    Affected Program:    Hybrid Network's Cable Modems
    
    Author:              David Goldsmith <dhgat_private>
    
    Summary:             Remote attackers can anonymously reconfigure any
                         Hybrid Network's cable modem that is running HSMP.
                         This can be used to steal information and
                         login/password pairs from cable modem users.
    
    Problem Description: Hybrid Network's cable modems can be configured via
                         a UDP based protocol called HSMP.  This protocol
                         does not require any authentication to perform
                         configuration requests.  Since UDP is easily spoofed,
                         configuration changes can made anonymously.
    
    Compromise:          There are a plethora of denial of services attacks
                         involving bad configuration settings (ethernet
                         interfaces set to non-routable IP addresses, et al).
                         HSMP can also be used to configure the DNS servers
                         used by cable modem users, allowing attackers to
                         redirect cable modem subscribers to a trojan site.
    
                         More complex and theoretical attacks could involve
                         the running of actual code through the debugging
                         interface.  This might allow remote attackers to
                         deploy ethernet sniffers on the cable modem.
    
    Notes:               KSR[T] found this vulnerability in parallel with
                         Paul S. Cosis <siliat_private> and the l0pht.  We
                         would like to thank them for their input to this
                         advisory.
    
    Patch/Fix:           Cable providers should block out HSMP traffic
                         (7777/udp) on their firewalls.
    
    Links:               KSR[T] had initially written a demonstration
                         HSMP client which is located at:
    
                         http://www.ksrt.org/ksrt-hsmp.tar.gz
    
                         There is also another HSMP client located at:
    
                         http://www.larsshack.org/sw/ccm/
    
                         l0pht modified the above client and added
                         the ability to spoof the source address, allowing
                         for the anonymous reconfiguration of Hybrid cable
                         modems). Their client is located at:
    
                         http://c0re.l0pht.com/~sili/ccm-spoof.tar.gz
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:06:51 PDT