04-09-2016 08:54 AM
There is an article on zdnet today stating 135 million owners of the Arris SB6141 are vulnerable to denial of service attached due to a bug dating back to 2008. Here is the article. Arris claims they just did a firmware update to correct this flaw so I'm trying to find out what the latest firmware version is for the SB6141? When I access my modemm, here is the information provided: It definitely worries me that the info below shows the last firmware update as having been pushed way back in March 2014.
Model Name: SB6141
Vendor Name: Motorola
Firmware Name: SB_KOMODO-188.8.131.52-SCM01-NOSH
Boot Version: PSPU-Boot(25CLK) 184.108.40.206m3
Hardware Version: 7.0
Serial Number: 348781228820608308020001
Firmware Build Time: Mar 6 2014 15:23:55
04-09-2016 12:10 PM - edited 04-09-2016 12:12 PM
That really isn't a problem on TWC, it allows you to reset the modem and get a fresh provisioning file. It also requires you to disconnect the coax for it to work. If you're at that point, the modem already has an issue with something beyond it, very few if any reset commands actually fix connectivity issues.
This author is simply reposting someone elses article and never tried to duplicate the supposed vulnerability.
If it even is a vulnerability...
This can only be done from the lan-users side and yes, there's a lot of dumb consumers, like the Ren and Stimpy "don't push the button" episode....
And yes you can reset the modem in the HW ver 8 2015 firmware version 6141's
It's there to avoid sending out a technician if the modem get's corrupted. only solution is to remove the reset url from the comand table in the firmware
I'd rather see a red button on the back, lol.
This is not a DOS attack as the author claims.. DOS attacks are from the wan side. I don't think this guy has a clue....
04-13-2016 08:11 AM
If you go to any site and are dumb enough to click on a button to fix anything and then foolishly enter in your credentials, there's no need for any sort of fix short of end user awareness training..
The ZDNET article's claims of vulnerability is untrue because the user cannot change anything in the modem only devices.
If this were an advanced gateway, that's another story.
Some of these scam sites send a dummy web page as well, then you're locked out. the entire entire system is held for a $$$$ ransom.
The Author has written a tabloid style article,