The text outlines vulnerabilities discovered in Cox modems that could have allowed unauthorized access and malicious commands. Security researcher Sam Curry highlighted these flaws, noting their potential to compromise millions of devices and access sensitive customer data. Despite the alarming implications, responsible disclosure led Cox to swiftly address the issues within 24 hours, mitigating any known exploitation in the wild.
Curry’s research underscored the ease with which attackers could gain extensive control over modems, akin to ISP support teams. Cox’s remote management capabilities, enabled through the TR-069 protocol, provided a gateway for exploitation through exposed API endpoints. These endpoints allowed for administrative functions and unauthorized command execution, posing significant security risks.
An analysis of Cox’s infrastructure revealed around 700 exposed API endpoints, some of which could be weaponized to access and modify customer accounts. The discovery of a “profilesearch” endpoint, for instance, highlighted the potential for unauthorized retrieval and modification of business customer accounts. Moreover, the revelation that cryptographic secrets could be leveraged to overwrite device settings heightened concerns about the extent of possible exploitation.
While Cox promptly addressed the vulnerabilities, Curry emphasized the complexity of managing customer devices like routers and modems. He noted that building a robust authorization mechanism for such devices is challenging, highlighting the need for better security practices from the outset. The episode serves as a reminder of the ongoing security challenges in managing internet-connected devices and the importance of proactive security measures in safeguarding user data.