A bug in Comcast's website used to activate Xfinity routers can return sensitive information on the company's customers.
The website[1], used by customers to set up their home internet and cable service, can be tricked into displaying the home address where the router is located, as well as the Wi-Fi name and password.
Two security researchers, Karan Saini and Ryan Stevenson, discovered the bug.
Saini, who previously discovered an Uber two-factor bypass bug[2] and a flaw in India's national biometric database[3], told ZDNet about the bug.
Only a customer account ID and that customer's house or apartment number is needed -- even though the web form asks for a full address. That information could be grabbed from a discarded bill or obtained from an email. In any case, a determined attacker could simply guess the house or apartment number.
ZDNet obtained permission from two Xfinity customers to check their information. We were able to obtain their full address and zip code -- which both customers confirmed.
The site returned the Wi-Fi name and password -- in plaintext -- used to connect to the network for one of the customers who uses an Xfinity router. The other customer was using his own router -- and the site didn't return the Wi-Fi network name or password.
(Screenshots: ZDNet)The bug returns data even if the Xfinity Wi-Fi is already switched on.
Even when the Wi-Fi password changes, running the details again will return the new Wi-Fi password. There appears to be no way for customers to opt out when using Xfinity hardware.
It's also possible to rename Wi-Fi