Recently came across this article in ComputerWorld by their security blogger Michael Horowitz who writes the "Defensive Computing" column.
http://www.computerworld.com/article/2887243/using-a-router-to-block-a-modem.html
The gist of the article is that many routers, including most Asus routers, will pass out an address that is supposed to be reserved for LAN-side only to the WAN port. The example he cites is that an address of "192.168.100.1" which is the IP address of many cable modems (including some of the most popular such as the SB6141 and SB6183 from Arris) can be passed freely out the WAN port (since this is how the cable modem connects, and it's WAN-side, not LAN-side). So that's an issue with the routers.
The issue with some modems that makes this router "flaw" of particular concern is that there's no way to password protect them. All of the Arris Surfboard routers, come without any password protection, and in fact there's no way to implement a password at all in the firmware. Thus, all you need to do is access the cable modem's firmware GUI through a browser connected to the LAN is typing 192.168.100.1, and boom, you're in.
Now there's not much you can do with these modems in terms of configuring them. In fact, all you really can do is reset them, or restore them to factory defaults (which would be bad, since it would then have to be re-enabled by your ISP just to work again).
Horowitz posits that this is a flaw in both the modem (since it doesn't come password protected and there's no way to enable one, something I can confirm since I own an SB6183), and with the routers since they shouldn't be passing a private reserved IP (one that can't be registered with IANA) that is within a range that is supposed to be reserved for internal LAN-side communication only) such as 192.168.x.x to devices connected only on the WAN side.
His proposed solution is to enable Network Services Filtering and to block access to "192.168.100.1" in the destination side IP's for TCP. Of course that not only blocks potential malicious threats, it blocks your own access (unless you turn off the Network Services Filter first).
Personally, I don't know what to make of this and am unsure about blocking access to my own modem's GUI (even if only temporarily). How much of a real threat does this pose? I suppose someone could embed an image with some sort of malicious code that when viewed would enable a complete reset of those routers whose GUI's can be accessed without a password.
Any thoughts on this?
http://www.computerworld.com/article/2887243/using-a-router-to-block-a-modem.html
The gist of the article is that many routers, including most Asus routers, will pass out an address that is supposed to be reserved for LAN-side only to the WAN port. The example he cites is that an address of "192.168.100.1" which is the IP address of many cable modems (including some of the most popular such as the SB6141 and SB6183 from Arris) can be passed freely out the WAN port (since this is how the cable modem connects, and it's WAN-side, not LAN-side). So that's an issue with the routers.
The issue with some modems that makes this router "flaw" of particular concern is that there's no way to password protect them. All of the Arris Surfboard routers, come without any password protection, and in fact there's no way to implement a password at all in the firmware. Thus, all you need to do is access the cable modem's firmware GUI through a browser connected to the LAN is typing 192.168.100.1, and boom, you're in.
Now there's not much you can do with these modems in terms of configuring them. In fact, all you really can do is reset them, or restore them to factory defaults (which would be bad, since it would then have to be re-enabled by your ISP just to work again).
Horowitz posits that this is a flaw in both the modem (since it doesn't come password protected and there's no way to enable one, something I can confirm since I own an SB6183), and with the routers since they shouldn't be passing a private reserved IP (one that can't be registered with IANA) that is within a range that is supposed to be reserved for internal LAN-side communication only) such as 192.168.x.x to devices connected only on the WAN side.
His proposed solution is to enable Network Services Filtering and to block access to "192.168.100.1" in the destination side IP's for TCP. Of course that not only blocks potential malicious threats, it blocks your own access (unless you turn off the Network Services Filter first).
Personally, I don't know what to make of this and am unsure about blocking access to my own modem's GUI (even if only temporarily). How much of a real threat does this pose? I suppose someone could embed an image with some sort of malicious code that when viewed would enable a complete reset of those routers whose GUI's can be accessed without a password.
Any thoughts on this?
Last edited: