If the modem is in bridged mode, this problem should not be exploitable, no?
-
-
-
We have not yet tested this, but hopefully not.
- Još 2 druga odgovora
Novi razgovor -
-
-
Is the vulnerable spectrum analyzer code "owned" by
@broadcom, or by individual modem OEMs? -
As far as we're informed, no. It seems to be reference software, that has been implemented in slightly different ways by different vendors. This is also one of the reasons why tracking the vulnerability is difficult, and why we hope to spread the word through public disclosure.
- Još 2 druga odgovora
Novi razgovor -
-
-
Tweet je nedostupan.
-
Properly end-to-end encrypted requests are not vulnerable, including DNS. So
#Dnsoverhttps and similar ideas sound even better now. There are many ways to mitigate loss of privacy with#cablehaunt, but it could still be misused for botnets, DoS, or for staging other exploits. - Još 2 druga odgovora
-
-
-
Vi arbejder på at få lagt værktøjet op inden længe.
Kraj razgovora
Novi razgovor -
-
Very compelling research. I've done similar research in the past and the problem I've always run into is the lack of availability of firmware for CMs. How did you get the binaries to analyze and build the ROPChain?
-
We started by bit-banging the firmware from the onboard flash of a TC7230. Then, by enabling serial connections we managed to extract the binary firmware with the help of https://github.com/jclehner/bcm2-utils …. But there is a long way to open source.
- Još 2 druga odgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.