Arris modem vulnerabilities

Serious security vulnerabilities have been found in Arris-manufactured modems used by AT&T’s U-verse service.

Five vulnerabilities have been discovered, one that is trivial to exploit according to a security researcher Joseph Hutchins of Nomotion Software, SecurityWeek reports.

The vulnerabilities disclosed include:

  1. SSH exposed to The Internet; superuser account with hardcoded username/password
  2. Default credentials “caserver” https server NVG599
  3. Command Injection “caserver” https server NVG599
  4. Information disclosure/hardcoded credentials
  5. Firewall bypass no authentication.

It is not certain yet whether the vulnerabilities were introduced by Arris or after delivery to the ISP, AT&T U-verse.

Leave a Reply