To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

Cable Haunt
CVE identifier(s)CVE-2019-19494, CVE-2019-19495
DiscovererAlexander Dalsgaard Krog (Lyrebirds), Jens Hegner Stærmose (Lyrebirds), Kasper Kohsel Terndrup (Lyrebirds), Simon Vandel Sillesen (Independent)

Cable Haunt is the code name assigned to represent two separate vulnerabilities that affect many of the cable modems in use around the world in 2020.[1][2] These vulnerabilities allow an attacker to obtain external access to a cable modem and perform any number of activities intended to modify the operation of, or monitor the data passing through a cable modem.[3]

The problem lies with the Broadcom system-on-a-chip, which is used in many cable modems, specifically with the software running the spectrum analyzer, which protects against any power surges in the cable signal.[3] It exposes an unsecured WebSockets interface that Cable Haunt can reach using JavaScript run in a victim's browser.[1]

Modems impacted by Cable Haunt give remote attackers full (kernel level[1]) control over the cable modem, allowing them to potentially:[4]

Most home and small businesses obtain their cable modems directly from their Internet service providers (ISPs). In situations where ISPs control the patching and firmware updating processes, subscribers must wait for cable providers to receive updated firmware from manufacturers and push it down to each individual modem. Cable companies were initially slow to respond to this threat, but now are actively working to get updates for customers.[5]

On January 19, 2020 Schrock Innovations, a computer repair company based in Lincoln, Nebraska, released executable programs for x64 Windows systems and OS X systems based on Lyrebirds' original JavaScript. These programs allowed less technically advanced users the ability to test their own connections. Users of the programs were instructed to contact their ISP if their modem was vulnerable in order to increase public pressure for patches to be created in order to address the vulnerability.[6]

References

  1. ^ a b c "CVE-2019-19494". Common Vulnerabilities and Exposures. Retrieved 2020-01-19.
  2. ^ "CVE-2019-19495". Common Vulnerabilities and Exposures. Retrieved 2020-01-19.
  3. ^ a b "Hundreds of millions of cable modems could be hacked due to 'Cable Haunt' flaw". Tom's Guide. January 14, 2020. Retrieved 2020-04-26.
  4. ^ Cimpanu, Catalin (January 10, 2020). "Hundreds of millions of cable modems are vulnerable to new Cable Haunt vulnerability". ZDNet. Retrieved 2020-01-19.
  5. ^ "'Cable Haunt' Bug Plagues Millions of Home Modems". threatpost.com. Retrieved 2020-01-19.
  6. ^ Schrock, Thor. "Cable Haunt". Retrieved 2020-01-19.

Further reading

This page was last edited on 12 October 2022, at 16:35
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.