Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Security Technology

AT&T, 2Wire Ignoring Active Security Exploit [Updated] 134

An anonymous reader writes "2Wire manufactures DSL modems and routers for AT&T and other major carriers. Their devices suffer from a DNS redirection vulnerability that can be used as part of a variety of attacks, including phishing, identity theft, and denial of service. This exploit was publicly reported more than eight months ago and applies to nearly all 2Wire firmware revisions. The exploit itself is trivial to implement, requiring the attacker only to embed a specially crafted URL into a Web site or email. User interaction is not required, as the URL may be embedded as an image that loads automatically with the requested content. The 2Wire exploit bypasses any password set on the modem/router and is being actively exploited in the wild. AT&T has been deploying 2Wire DSL modems and router/gateways for years, so there exists a large vulnerable installed base. So far, AT&T/2Wire haven't done anything about this exploit." Update: 04/09 17:48 GMT by KD : AT&T spokesman Seth Bloom sends word that AT&T has not been ignoring the problem. According to Bloom: "The majority of our customers did not have gateways affected by this vulnerability. For those that did, as soon as we became aware of the issue, we expeditiously implemented a permanent solution to close the vulnerability. In fact, we've already updated the majority of affected 2Wire gateways, and we're nearing completion of the process. We've received no reports of any significant threats targeting our customers."
This discussion has been archived. No new comments can be posted.

AT&T, 2Wire Ignoring Active Security Exploit [Updated]

Comments Filter:
  • Re:Sasktel customers (Score:5, Informative)

    by bcat24 ( 914105 ) on Tuesday April 08, 2008 @05:01PM (#23005330) Homepage Journal
    From TFA [securityfocus.com]:

    Vulnerable:
    2Wire 2071 Gateway 5.29.51
    2Wire 2071 Gateway 3.17.5
    2Wire 2071 Gateway 3.7.1
    2Wire 1800HW 5.29.51
    2Wire 1800HW 3.17.5
    2Wire 1800HW 3.7.1
    2Wire 1701HG 5.29.51
    2Wire 1701HG 3.17.5
    2Wire 1701HG 3.7.1
  • Re:Funny Post (Score:5, Informative)

    by bcat24 ( 914105 ) on Tuesday April 08, 2008 @05:04PM (#23005374) Homepage Journal
    That would be slightly funnier if the exploit actually involved SOCKS. In reality, it looks like a simple CSRF [wikipedia.org] attack. (Is it just me, or are we seeing a lot more of those lately?)
  • Re:Sasktel customers (Score:5, Informative)

    by compro01 ( 777531 ) on Tuesday April 08, 2008 @05:05PM (#23005378)
    yeah, but DSLreports is reporting [dslreports.com] that the 2700s and 2701s are vulnerable, so i'm not sure which is correct
  • by Anonymous Coward on Tuesday April 08, 2008 @05:15PM (#23005488)
    I tried their example for adding example.com to DNS (here as not a live link; copy it paste it yourself at your own risk):

    http://192.168.1.254/xslt?PAGE=J38_SET&THISPAGE=J38&NEXTPAGE=J38_SET&NAME=www.example.com&ADDR=127.0.0.1
    and all it did was leave me at the "enter system password" page. Yes, my router has a non-default system password. The system software release is 4.25.19.
  • by Anonymous Coward on Tuesday April 08, 2008 @05:41PM (#23005778)
    A couple users at DSLreports indicated hat the hack is able to change the password on 4.25.19 firmware: http://www.dslreports.com/forum/r19987755-2Wire-Cross-Site-Request-Forgery-Vulnerability [dslreports.com]

    Perhaps the hacker could change the password, then follow it up with a DNS entry.
  • by Some_Llama ( 763766 ) on Tuesday April 08, 2008 @05:42PM (#23005790) Homepage Journal
    You can implement a temporary fix yourself. The first post in the following thread describes how to protect yourself until 2wire fixes the issue 2Wire Cross Site Request Forgery Vulnerability .

    Here is a short summary:

    First, change the IP scheme that the 2wire is using for your home network. Specifically, change the IP address of the 2wire router itself. This will prevent attacks against 192.168.1.254.

    Next you have to prevent attacks against the domains "home" and "gateway.2wire.net". You can do this a couple of ways. You can modify your hosts file and point those domains to 127.0.0.1... or you can hardcode the dns settings into your computer so that your computer is not using the 2wire to resolve domain names.

    Of course the bottom line is 2wire needs to plug this hole. When will that happen? Who knows.
  • by skis ( 920891 ) on Tuesday April 08, 2008 @05:53PM (#23005912)
    This exploit is CSRF (Cross-site request forgery). This means that you have to have an active authenticated session to your router in your browser. When you click the link and your browser is already authenticated, it will send your session cookie along with the HTTP request, and the web server in your router will know you are already authenticated, and execute the command you gave it.

    Try logging in to your router, open a new tab, and click on that link again and see if it works.
  • by compro01 ( 777531 ) on Tuesday April 08, 2008 @07:00PM (#23006534)
    hmm. the 2wire boxes i see (2700s) are default WEP, but have the option for WPA and WPA2.
  • by Clueless Moron ( 548336 ) on Tuesday April 08, 2008 @08:00PM (#23007040)

    (replying to myself...)

    apparently it works only if you happen to have logged into an admin page on the router within the past few minutes, which is remarkably unlikely.

    Ok, I see the problem now: although just about every setup page imaginable on the router uses a session cookie to make sure you have logged in, the "set initial router password" page does not, and does not care if an initial password has already been set (stupid!).

    So the 'sploit is to first invoke the "set initial router password" page. It doesn't matter what it sets it to, because completing that page logs you in, and so your browser gets the session cookie and now all the other pages work. Such as the one that adds www.example.com to DNS.

    Nice. Fortunately my home system doesn't use the 2wire DNS at all.

  • by Erpo ( 237853 ) on Wednesday April 09, 2008 @01:05AM (#23009260)
    By default they come with 32 bit WEP

    You're closer to the truth than you know. They use 64 bit (i.e. 8 byte) WEP by default, which is really 40 bit (i.e. 5 byte) WEP since three of those bytes are the IV and broadcast in the clear. However, 2WIRE has an awful policy of printing the WEP key on the side of the modem in hex format and not using the digits A through F.

    So the default key, written in hex, is a "decimal" number somewhere between 0,000,000,000 and 9,999,999,999. That's only 10 billion possibilities, or about 33.2 bits of entropy. Your computer can crack through that in a day or two with only three or four captured packets.

    When I discovered this (and, of course, got stonewalled by 2WIRE), I wrote a patch for aircrack (now aircrack-ng) that programs it to search only the binary coded decimal keyspace. I named this option -t in honor of "Two Wire" for their terrible security.

New York... when civilization falls apart, remember, we were way ahead of you. - David Letterman

Working...