Article Details
Scrape Timestamp (UTC): 2024-06-03 21:12:51.318
Original Article Text
Click to Toggle View
Cox fixed an API auth bypass exposing millions of modems to attacks. Cox Communications has fixed an authorization bypass vulnerability that enabled remote attackers to abuse exposed backend APIs to reset millions of modems' settings and steal customers' sensitive personal information. Cox is the largest private broadband company in the U.S., providing internet, television, and phone services over fiber-powered networks to almost seven million homes and businesses across more than 30 states. Bug bounty hunter Sam Curry discovered the security flaw and found that successful exploitation gave threat actors a similar set of permissions as ISP tech support. The attackers could've used this access to exploit any of the millions of Cox devices accessible through the vulnerable Cox APIs, overwriting configuration settings and executing commands on the device. For example, by exploiting this authentication bypass vulnerability, malicious actors can look for a Cox customer using their name, phone number, email address, or account number via the exposed APIs. They can then steal their personally identifiable information (PII), including MAC addresses, email, phone numbers, and addresses. The attackers can also collect connected devices' Wi-Fi passwords and other information by querying the hardware MAC address stolen in the previous attack stage. Subsequently, they can execute unauthorized commands, modify device settings, and gain control over the victim's accounts. "This series of vulnerabilities demonstrated a way in which a fully external attacker with no prerequisites could've executed commands and modified the settings of millions of modems, accessed any business customer's PII, and gained essentially the same permissions of an ISP support team," Curry said. "There were over 700 exposed APIs with many giving administrative functionality (e.g. querying the connected devices of a modem). Each API suffered from the same permission issues where replaying HTTP requests repeatedly would allow an attacker to run unauthorized commands." The company took down the exposed API calls within six hours of Curry's report on March 3 and patched the vulnerability the next day. As part of a follow-up security review, Cox also investigated whether this attack vector had ever been exploited before being reported but said it found no evidence of previous abuse attempts.
Daily Brief Summary
Cox Communications recently addressed an authorization bypass vulnerability affecting millions of modems.
The vulnerability allowed attackers remote access to modems to reset configurations and steal personal data.
Bug hunter Sam Curry discovered the flaw, which gave attackers permissions similar to ISP tech support.
Attackers could exploit the flaw to access users' personal information, including names, addresses, and Wi-Fi passwords.
The vulnerability involved over 700 exposed backend APIs with potential for executing unauthorized commands.
Cox responded quickly by disabling the vulnerable API calls within six hours and patching the flaw the following day.
Post-incident review by Cox found no evidence that the vulnerability had been exploited prior to its discovery and fix.