forked from BastilleResearch/CableTap
-
Notifications
You must be signed in to change notification settings - Fork 0
/
bastille-19.wifi-dhcp-cm-mac-leak.txt
45 lines (19 loc) · 1.03 KB
/
bastille-19.wifi-dhcp-cm-mac-leak.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
Bastille Tracking Number 19
CVE-2017-9477
Overview
A vulnerability has been discovered that enables an attacker to discover the CM MAC of a Comcast customer's gateway by connecting to the "xfinitywifi" hotspot running on the gateway.
Affected Platforms
Cisco DPC3939, firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST
Cisco DPC3939, firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST
Proof-of-Concept
When a user connects to an "xfinitywifi" hotspot on an affected gateway, the CM MAC, which is not normally known, is included in the DHCP ACK.
Test Environment
Cisco DPC3939, firmware version dpc3939-P20-18-v303r20421733-160420a-CMCST
Cisco DPC3939, firmware version dpc3939-P20-18-v303r20421746-170221a-CMCST
Mitigation
Comcast customers can prevent this information leakage by disabling the "xfinitywifi" hotspot on their gateway.
Recommended Remediation
Configure the "xfinitywifi" DHCP server so that it does not leak the CM MAC.
Credits
Marc Newlin and Logan Lamb, Bastille
Chris Grayson, Web Sight.IO