-
Notifications
You must be signed in to change notification settings - Fork 23
/
bastille-40.ethernet-snmp.txt
45 lines (18 loc) · 1.09 KB
/
bastille-40.ethernet-snmp.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
Bastille Tracking Number 40
CVE-2017-9496
Overview
A vulnerability has been discovered that enables an attacker to access an SNMP server running on the Motorola MX011ANM.
Affected Platforms
Motorola MX011ANM, firmware version MX011AN_2.9p6s1_PROD_sey
Proof-of-Concept
The Motorola MX011ANM includes an Ethernet port, which upon first glance appears to be inactive. Assuming a similar addressing scheme to the wireless gateways, which use a clustered range of MAC addresses and IPv6 addresses based on the MAC addresses, we were able to guess the link local IPv6 address of the Ethernet port.
We then discovered that an SNMP server running on the set-top box can be accessed by addressing the link-local IPv6 address of the Ethernet port.
Test Environment
Motorola MX011ANM, firmware version MX011AN_2.9p6s1_PROD_sey
Mitigation
There is no apparent mechanism to allow Comcast customers to change this behavior.
Recommended Remediation
Patch the arbitrary file read vulnerability we used to learn the community string.
Credits
Marc Newlin and Logan Lamb, Bastille
Chris Grayson, Web Sight.IO