Security researchers at Tenable uncovered multiple flaws with Verizon Fios Quantum Gateway router that allows a remote attacker to gain complete access over the network.
By exploiting the vulnerability an attacker could sniff into victims network traffic and van exfiltrate personal and financial details.
Three vulnerabilities discovered in Verizon’s Fios Quantum Gateway routers.
- CVE-2019-3914 – Authenticated Remote Command Injection
- CVE-2019-3915 – Login Replay
- CVE-2019-3916 – Password Salt Disclosure
Command Injection – CVE-2019-3914
The vulnerability can be triggered by adding a firewall access control rule with a crafted hostname. In order to perform the command injection the attacker to be authenticated to device web admin interface.
Chris Lyne explained a possible insider threat, remote attack scenario for the command injection Vulnerability.
An insider could determine the public IP address and from the sticker, in the router, they grab the default login credentials. By having the information they can log in with the router and enable Remote Administration.
By enabling the remote administration the attacker can exploit CVE-2019-3914 remotely and gain access to the network.
CVE-2019-3915 – Login Replay
HTTPS is not enforced for the router web admin interface Login URL, it allows an attacker in the same network to sniff the packets and to gain access over the web interface.
CVE-2019-3916 – Password Salt Disclosure
As the firmware doesn’t enforce the HTTPS, a local attacker can sniff the login request contains the salted password hash and could perform a dictionary attack to recover the original password.
These routers are supplied to all new Verizon Fios customers unless they elect to use their own router, which isn’t very common, said Chris Lyne. he outlined several potential attack scenarios.
Users of Verizon Fios routers are urged to updated with version 02.02.00.13 and the researchers also released PoC.