As lf 10/20/09, a software maven has written of a major security hole (one you can drive a TRUCK through) in the wifi/cable modem models issued to customers who don’t want to use their own equipment.
Here’s the link, in all its’ details, by David Chen, writing up the vulnerability, which HAS been confirmed by Time-Warner. As of this writing, Time-Warner has no plans to change or resolve the vulnerability.
Here’s the quick version:
The modem: SMC8014 series cable modem/wifi router combination
Issue 1 : Time-Warner/SMC has the modem locked down in a default mode which is not accessible to the average user. The default configuration has a default username/password and has locked WEP as the wifi encryption with a standard SSID. (You might as well make the SSID: HACK_ME_I’M_EASY)
Issue 3: The backup configuration file comes in a plain text file, which includes the admin ID and password. In plain text.
Issue 4: By default, the web admin interface is accessible from ANYWHERE on the internet. By running a simple port scan of Time Warner IP addresses, David Chen easily found dozens of these routers, open to attack.
So you KNOW that this since this has been picked up by Wired every knucklehead out there will be looking for these routers to play with.
The resolution to this mind-boggling issue that Time-Warner says they can’t do anything about?
Replace the modem – ASAP. And, complain, complain, complain.