An estimated 200 million modems or more may be vulnerable to an exploit dubbed Cable Haunt, which researchers said could give attackers complete control over their victims’ devices.

First discovered and detailed in a site set up by a Denmark-based security firm called Lyrebirds, the threat involves serving JavaScript-based malware code to users who have been lured to a website or who click on malicious ads. A buffer flow vulnerability in the spectrum analyzer is then exploited via a websocket connection opened by the JavaScript. At that point, cybercriminals can use Cable Haunt to do everything from make the device part of a botnet to changing its DNS settings.

Many Modems Affected by Vulnerability

A small server that’s intended to detect connectivity problems in a modem, the spectrum analyzer is key to the vulnerability, which researchers said affects a number of different manufacturers and product models. These include cable modems from Netgear’s C6250EMR and CG3700EMR, Sagemcom’s [email protected] 3890 and [email protected] 3686, and possibly Technicolor’s TC7230, among others.

Attackers taking advantage of Cable Haunt can also do so outside the local network, researchers added, by connecting the modem through the browser via malicious JavaScript code. The code is accepted because cross-origin resource sharing, which normally prevents such activity, doesn’t protect websockets.

Since cable modems typically manage all online traffic for devices connected to a network, the vulnerability means attackers could not only gain remote access but intercept private messages, redirect traffic to other sites, monitor unencrypted data and even install completely new firmware.

Researchers have created a proof-of-concept of the threat, which manufacturers may need to check, given that the 200 million estimate is restricted to devices in Europe and the risk may be even larger on a global scale.

The only exception to those vulnerable to the threat are those using Firefox, a browser whose websocket is incompatible with that used by a spectrum analyzer.

Close Off Cable Haunt’s Access

As more vendors become aware of Cable Haunt, they’ll likely issue a patch or fix that customers can use to avoid it. In the meantime, a comprehensive security information and event management (SIEM) system can be a good way to stay alert when suspicious activity starts taking place on the network.

More from

New Attack Targets Online Customer Service Channels

An unknown attacker group is targeting customer service agents at gambling and gaming companies with a new malware effort. Known as IceBreaker, the code is capable of stealing passwords and cookies, exfiltrating files, taking screenshots and running custom VBS scripts. While these are fairly standard functions, what sets IceBreaker apart is its infection vector. Malicious actors are leveraging the helpful nature of customer service agents to deliver their payload and drive the infection process. Here’s a look at how IceBreaker…

Operational Technology: The evolving threats that might shift regulatory policy

Listen to this podcast on Apple Podcasts, Spotify or wherever you find your favorite audio content. Attacks on Operational Technology (OT) and Industrial Control Systems (ICS) grabbed the headlines more often in 2022 — a direct result of Russia’s invasion of Ukraine sparking a growing willingness on behalf of criminals to target the ICS of critical infrastructure. Conversations about what could happen if these kinds of systems were compromised were once relegated to “what ifs” and disaster movie scripts. But those days are…

Cybersecurity 101: What is Attack Surface Management?

There were over 4,100 publicly disclosed data breaches in 2022, exposing about 22 billion records. Criminals can use stolen data for identity theft, financial fraud or to launch ransomware attacks. While these threats loom large on the horizon, attack surface management (ASM) seeks to combat them. ASM is a cybersecurity approach that continuously monitors an organization’s IT infrastructure to identify and remediate potential points of attack. Here’s how it can give your organization an edge. Understanding Attack Surface Management Here…

Six Ways to Secure Your Organization on a Smaller Budget

My LinkedIn feed has been filled with connections announcing they have been laid off and are looking for work. While it seems that no industry has been spared from uncertainty, my feed suggests tech has been hit the hardest. Headlines confirm my anecdotal experience. Many companies must now protect their systems from more sophisticated threats with fewer resources — both human and technical. Cobalt’s 2022 The State of Pentesting Report found that 90% of short-staffed teams are struggling to monitor…