Security News > 2020 > January > Cable Haunt: Unknown millions of Broadcom-based cable modems open to hijacking

Cable Haunt: Unknown millions of Broadcom-based cable modems open to hijacking
2020-01-13 13:56

A vulnerability in Broadcom's cable modem firmware can open unknown millions of broadband modems by various manufacturers to attackers, a group of Danish researchers has warned.

CVE-2019-19494, also dubbed Cable Haunt, is present in the spectrum analyzer, a standard component of Broadcom chips that identifies potential problems with the connection through the modem's coaxial cable.

"There are an estimated 200 million cable modems in Europe alone. With almost no cable modem tested being secure without a firmware update, the number of modems initially vulnerable in Europe is estimated to be close to this number," the researchers shared.

"However, it is tough to give a precise estimate of the reach of Cable Haunt. The reason for this is that the vulnerability originated in reference software, which has seemingly been copied by different cable modems manufacturers when creating their cable modem firmware. This means that we have not been able to track the exact spread of the vulnerability and that it might present itself in slightly different ways for different manufacturers."

"Check with the manufacturer of your modem if the latest firmware prevents Cable Haunt, and if the modem were ever vulnerable. If you suspect that your modem has been compromised, update the firmware to a version not vulnerable to Cable Haunt. Then you should consider if your past non-encrypted internet traffic contains sensitive information, such as passwords or personal emails, and take precautions accordingly," they added.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/HxdW_-lusSs/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2020-01-09 CVE-2019-19494 Classic Buffer Overflow vulnerability in multiple products
Broadcom based cable modems across multiple vendors are vulnerable to a buffer overflow, which allows a remote attacker to execute arbitrary code at the kernel level via JavaScript run in a victim's browser.
9.3