what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

lagsa-com21.txt

lagsa-com21.txt
Posted Nov 2, 2002
Authored by David | Site lag.securinet.qc.ca

Lag Security Advisory - Com21 cable modem configuration file feeding vulnerability. All Com21 DOXport 1110 cable modems with software version 2.1.1.106 are vulnerable to being fed a configuration file that will allow a user to have access to features that are not paid for by spoofing an ISP-side TFTP server to feed the data.

tags | advisory, spoof
SHA-256 | 21174a7ece399423e3136d1c78ecc11cf864756b62fe48d179e2436176fa3641

lagsa-com21.txt

Change Mirror Download
The advisory is also available in Word and HTML format at:
http://lag.securinet.qc.ca/papers.html

--

Lag Security Advisory
Com21 cable modem configuration file feeding vulnerability

Release date: November 1, 2002.
Vulnerability discovery date: Over six (6) months ago.

.systems affected.
All Com21 DOXport 1110 cable modems with software version 2.1.1.106.
Version 2.1.1.108.003 appears not to be vulnerable.

Please note that this vulnerability might affect other vendors cable
modems. In fact, all cable modems trying to contact a TFTP server on the
cable-side of the user are vulnerable.

.overview.
It is possible for an end-user to feed the cable modem with its own
configuration file, and thus, specifying the number of CPE,
download/upload speeds, and a few other options.

.impact.
Well, obviously, the user could have access to features that he does not
pay for.

.solution.
Upgrading the software to version 2.1.1.108.003 or any other software
version that is not vulnerable.

.complete description.
With a given program, an end-user is able to create cable modem
configuration files following the DOCSIS standard. With a vulnerable
Com21 cable modem, the user can create a TFTP, DCHP and BOOTP server to
successfully feed the cable modem with its own configuration file. I
used a program called docsis (http://docsis.sourceforge.net/) to first
create the configuration file.

Then, I used tcpdump (http://www.tcpdump.org/) to capture packets from
the wire to discover what boot options were required for my cable modem.
I also used an SNMP client to discover the internal IP of my cable modem
from the main router. Knowing this, I was also able to view the cable
modem web page as well as change SNMP options.

With all this load of information, I created a DHCP server (I also added
an IP alias to my Ethernet card so that it could give the internal IP to
the cable modem), a BOOTP server and finally a TFTP server. After a
couple of hard reboots of my cable modem, I could see in my TFTP server
logs that the device download its configuration file from my server. I
then tried to access the Internet and it worked as normally.

.conclusion.
Many Internet providers offering cable modem access to the Internet
appears not to be aware of those vulnerabilities. I supplied a detailed
description of how to exploit the problem for the users to help their
network administrators to fix the problem. And as always, if you make
crazy things out of this, I am in no way responsible for all your problems.


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close