January 15, 2020 By Shane Schick 2 min read

An estimated 200 million modems or more may be vulnerable to an exploit dubbed Cable Haunt, which researchers said could give attackers complete control over their victims’ devices.

First discovered and detailed in a site set up by a Denmark-based security firm called Lyrebirds, the threat involves serving JavaScript-based malware code to users who have been lured to a website or who click on malicious ads. A buffer flow vulnerability in the spectrum analyzer is then exploited via a websocket connection opened by the JavaScript. At that point, cybercriminals can use Cable Haunt to do everything from make the device part of a botnet to changing its DNS settings.

Many Modems Affected by Vulnerability

A small server that’s intended to detect connectivity problems in a modem, the spectrum analyzer is key to the vulnerability, which researchers said affects a number of different manufacturers and product models. These include cable modems from Netgear’s C6250EMR and CG3700EMR, Sagemcom’s F@st 3890 and F@st 3686, and possibly Technicolor’s TC7230, among others.

Attackers taking advantage of Cable Haunt can also do so outside the local network, researchers added, by connecting the modem through the browser via malicious JavaScript code. The code is accepted because cross-origin resource sharing, which normally prevents such activity, doesn’t protect websockets.

Since cable modems typically manage all online traffic for devices connected to a network, the vulnerability means attackers could not only gain remote access but intercept private messages, redirect traffic to other sites, monitor unencrypted data and even install completely new firmware.

Researchers have created a proof-of-concept of the threat, which manufacturers may need to check, given that the 200 million estimate is restricted to devices in Europe and the risk may be even larger on a global scale.

The only exception to those vulnerable to the threat are those using Firefox, a browser whose websocket is incompatible with that used by a spectrum analyzer.

Close Off Cable Haunt’s Access

As more vendors become aware of Cable Haunt, they’ll likely issue a patch or fix that customers can use to avoid it. In the meantime, a comprehensive security information and event management (SIEM) system can be a good way to stay alert when suspicious activity starts taking place on the network.

More from

White House cements CISA’s role as national coordinator for cybersecurity

2 min read - In 2013, the Obama Administration rolled out "The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience", a forerunner to the Cybersecurity and Infrastructure Security Agency (CISA), created "to strengthen and maintain secure, functioning and resilient critical infrastructure."The directive was groundbreaking in 2013, noting the importance of the rising risk of cyberattacks against critical infrastructure. But as cyber risks are constantly shifting, every cybersecurity program needs to be re-evaluated, and CISA is no exception. That’s why, in April 2024, President…

How a new wave of deepfake-driven cybercrime targets businesses

5 min read - As deepfake attacks on businesses dominate news headlines, detection experts are gathering valuable insights into how these attacks came into being and the vulnerabilities they exploit.Between 2023 and 2024, frequent phishing and social engineering campaigns led to account hijacking and theft of assets and data, identity theft, and reputational damage to businesses across industries.Call centers of major banks and financial institutions are now overwhelmed by an onslaught of deepfake calls using voice cloning technology in efforts to break into customer…

Grandoreiro banking trojan unleashed: X-Force observing emerging global campaigns

16 min read - Since March 2024, IBM X-Force has been tracking several large-scale phishing campaigns distributing the Grandoreiro banking trojan, which is likely operated as a Malware-as-a-Service (MaaS). Analysis of the malware revealed major updates within the string decryption and domain generating algorithm (DGA), as well as the ability to use Microsoft Outlook clients on infected hosts to spread further phishing emails. The latest malware variant also specifically targets over 1500 global banks, enabling attackers to perform banking fraud in over 60 countries…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today