CVE-2017-11502

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to read arbitrary files on Technicolor DPC3928AD DOCSIS cable modems by sending specially crafted HTTP GET requests to port 4321. The attack exploits a directory traversal flaw that doesn't require authentication, affecting all users of these devices with default configurations.

💻 Affected Systems

Products:
  • Technicolor DPC3928AD DOCSIS cable modem
Versions: All versions prior to patched firmware
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface on port 4321 which is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the device including extraction of sensitive configuration files, credentials, and potentially enabling further attacks on the local network.

🟠

Likely Case

Unauthorized access to device configuration files, potentially exposing network credentials and sensitive information.

🟢

If Mitigated

Limited impact if device is behind NAT/firewall with restricted access to port 4321.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication on a commonly exposed service port.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows unauthorized file access on affected devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request with directory traversal sequence is sufficient for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Specific firmware version not publicly documented, but Technicolor released patches

Vendor Advisory: No public vendor advisory URL available

Restart Required: Yes

Instructions:

1. Contact ISP for firmware update 2. Apply latest firmware from ISP 3. Reboot device after update

🔧 Temporary Workarounds

Block port 4321

linux

Prevent external access to the vulnerable service port

iptables -A INPUT -p tcp --dport 4321 -j DROP

Disable web management interface

all

Turn off the vulnerable web interface if not needed

🧯 If You Can't Patch

  • Isolate device on separate VLAN with strict access controls
  • Implement network segmentation to limit lateral movement

🔍 How to Verify

Check if Vulnerable:

Test with curl: curl -v 'http://[device_ip]:4321/../etc/passwd' and check for file contents in response

Check Version:

Check web interface or contact ISP for firmware version

Verify Fix Applied:

Retest with same curl command - should return error or no file contents

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '/../' patterns on port 4321
  • Unusual file access patterns from external IPs

Network Indicators:

  • HTTP GET requests to port 4321 with directory traversal sequences
  • Traffic to device management port from unauthorized sources

SIEM Query:

source_port:4321 AND (http_uri:"/../" OR http_uri:"..")

🔗 References

📤 Share & Export