≡ Menu

AT&T Uverse Modems Found To Have Several Serious Security Vulnerabilities

dustman81 writes: AT&T Uverse modems were found to have several serious vulnerabilities, including a superuser account with hardcoded username/password exposed to the internet via SSH, a HTTP server with little authentication which allows command injection, and an internet exposed service which exposes internal clients to external attacks. Information security consulting and software development firm Nomotion reports the findings in their blog: “It was found that the latest firmware update (9.2.2h0d83) for the NVG589 and NVG599 modems enabled SSH and contained hardcoded credentials which can be used to gain access to the modem’s ‘cshell’ client over SSH. The cshell is a limited menu driven shell which is capable of viewing/changing the WiFi SSID/password, modifying the network setup, re-flashing the firmware from a file served by any tftp server on the internet, and even controlling what appears to be a kernel module whose sole purpose seems to be to inject advertisements into the user’s unencrypted web traffic. Although no clear evidence was found suggesting that this module is actually being used currently, it is present, and vulnerable. Aside from the most dangerous items listed above, the cshell application is also capable of many other privileged actions. The username for this access is remotessh and the password is 5SaP9I26.” The report continues to detail the other vulnerabilities: Default credentials ‘caserver’ https server NVG599; Command injection ‘caserver’ https server NVG599; Information disclosure/hardcoded credentials; and Firewall bypass no authentication. Further reading: FierceTelecom; The Register

Read more of this story at Slashdot.

{ 0 comments… add one }

Leave a Comment

Home | About | Contact | Disclaimer | Terms | Privacy

Copyright © 2017 by Tom Connelly | All Rights Reserved