Serious security vulnerabilities have been found in Arris-manufactured modems used by AT&T’s U-verse service.
Five vulnerabilities have been discovered, one that is trivial to exploit according to a security researcher Joseph Hutchins of Nomotion Software, SecurityWeek reports.
The vulnerabilities disclosed include:
- SSH exposed to The Internet; superuser account with hardcoded username/password
- Default credentials “caserver” https server NVG599
- Command Injection “caserver” https server NVG599
- Information disclosure/hardcoded credentials
- Firewall bypass no authentication.
It is not certain yet whether the vulnerabilities were introduced by Arris or after delivery to the ISP, AT&T U-verse.