![]() The router is based on Greenwave Systems’ AXON Platform, which worked with Verizon on the update. ![]() If you use this service, there’s a good chance you’re part of this population. The FiOS Quantum Gateway (G1100) was launched in 2014 and is probably sitting in large numbers of homes and small businesses in the US that subscribe to Verizon’s fibre broadband. This might be tricky unless users have changed the secure default supplied with the router to something weaker. They’d still need to access to the SHA-512 password, which in this case Tenable suggests could be achieved through a dictionary attack against the revealed, salted hash. The final issue is CVE-2019-3916, through which…Īn unauthenticated attacker is able to retrieve the value of the password salt by simply visiting a URL in a web browser. Tenable blames the fact the router doesn’t enforce HTTPS for management sessions although, in fairness, precious few domestic routers do this because it’s seen as overkill for internal access. This is a basic flaw but, again, requires local access. How might an attacker get local access? Assuming the web management interface and Wi-Fi have been secured (each G1100 ships with a unique password), another route would be by exploiting the second flaw uncovered, identified as CVE-2019-3915.ĭescribed as a login replay flaw, an attacker could sniff login requests by capturing the “POSTed” SHA-512 password, replaying it to gain access to the router. from within the network), or where remote admin is turned on (which by default it isn’t). This would only give an attacker a way in via local access (i.e. However, read a bit further and an important qualification jumps out:Īn attacker must be authenticated to the device’s administrative web application in order to perform the command injection. Owners of Verizon’s FiOS Quantum Gateway (G1100) routers should check the firmware has been updated after security company, Tenable, made public three significant security flaws.ĭiscovered by a researcher in December, none of the three flaws offers hackers a simple remote knock-out but they’re still vulnerabilities every owner will want patched as soon as possible.Īt first glance, the most alarming is CVE-2019-3914, an authenticated command injection weakness which Tenable says can be “exploited remotely to achieve command execution with root privileges.”
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |