[LINK] security issue on routers (and other devices?)

Jan Whitaker jwhit at janwhitaker.com
Tue Jan 29 22:51:50 AEDT 2013


[I disabled this on my netgear ADSL modem/router to be on the safe(r) 
side -- not sure what it means will happen now that I have. I already 
have wifi access locked down to requiring an explicit MAC address, 
but this sounds like a different issue.]


'This definitely falls into the scary category': researchers warn of 
50 million exposed devices

Jim Finkle
Published: January 29, 2013 - 10:39PM

Bugs in widely used networking technology expose tens of millions of 
personal computers, printers and storage drives to attack by hackers 
over the regular internet, researchers with a security software maker said.

The problem lies in computer routers and other networking equipment 
that use a commonly employed standard known as Universal Plug and 
Play or UPnP. UPnP makes it easy for networks to identify and 
communicate with equipment, reducing the amount of work it takes to 
set up networks.

Security software maker <http://www.rapid7.com>Rapid7 said in a white 
paper to be released on Tuesday in the US that it discovered between 
40 million and 50 million devices that were vulnerable to attack due 
to three separate sets of problems that the firm's researchers have 
identified with the UPnP standard.

The long list of devices includes products from manufacturers 
including Belkin, D-Link, Cisco's Linksys division and Netgear.

Representatives for Belkin, D-Link, Linksys and Netgear could not be 
reached for comment on Monday evening US time.

Chris Wysopal, chief technology officer of security software firm 
Veracode, said he believed that publication of Rapid7's findings 
would draw widespread attention to the still emerging area of UPnP 
security, prompting other security researchers to search for more bugs in UPnP.

"This definitely falls into the scary category," said Wysopal, who 
reviewed Rapid7's findings ahead of their publication. "There is 
going to be a lot more research on this. And the follow-on research 
could be a lot scarier."

Rapid7 has privately alerted electronics makers about the problem 
through the CERT Coordination Centre, a group at the Carnegie Mellon 
Software Engineering Institute that helps researchers report 
vulnerabilities to affected companies.

"This is the most pervasive bug I've ever seen," said HD Moore, chief 
technology officer for Rapid7. He discussed the research with Reuters 
late on Monday US time.

Moore, who created a widely used platform known as Metasploit that 
allows security experts to simulate network attacks, said that he 
expected CERT to release a public warning about the flaw on Tuesday. 
A spokesman for the CERT Coordination Centre declined to comment.

A source with a networking equipment maker confirmed they had been 
alerted that CERT would issue an advisory on Tuesday and that 
companies were preparing to respond.

Taking control

The flaws could allow hackers to access confidential files, steal 
passwords, take full control over PCs as well as remotely access 
devices such as webcams, printers and security systems, according to Rapid7.

Moore said that there were bugs in most of the devices he tested and 
that device manufacturers will need to release software updates to 
remedy the problems.

He said that is unlikely to happen quickly.

In the meantime, he advised computer users to quickly use a free tool 
released by Rapid7 to identify vulnerable gear, then disable the UPnP 
functionality in that equipment.

Moore said hackers have not widely exploited the UPnP vulnerabilities 
to launch attacks, but both Moore and Wysopal expected they may start 
to do so after the findings are publicized.

Still, Moore said he decided to disclose the flaws in a bid to 
pressure equipment makers to fix the bugs and generally pay more 
attention to security.

People who own devices with UPnP enabled may not be aware of it 
because new routers, printers, media servers, web cameras, storage 
drives and "smart" or web-connected TVs are often shipped with that 
functionality turned on by default.

"You can't stay silent about something like this," he said. "These 
devices seem to have had the same level of core security for decades. 
Nobody seems to really care about them."

Veracode's Wysopal said that some hackers have likely already 
exploited the flaws to launch attacks, but in relatively small 
numbers, choosing victims one at a time.

"If they are going after executives and government officials, then 
they will probably look for their home networks and exploit this 
vulnerability," he said.

Rapid7 is advising businesses and consumers alike to disable UPnP in 
devices that they suspect may be vulnerable to attack. The firm has 
released a tool to help identify those devices 
<http://www.rapid7.com/resources/free-security-software-downloads/universal-plug-and-play-jan-2013.jsp>on 
its website.

Reuters
    * <http://twitter.com/itpro_au>Follow IT Pro on Twitter

This story was found at: 
http://www.theage.com.au/it-pro/security-it/this-definitely-falls-into-the-scary-category-researchers-warn-of-50-million-exposed-devices-20130129-2djav.html 




Melbourne, Victoria, Australia
jwhit at janwhitaker.com
blog: http://janwhitaker.com/jansblog/
business: http://www.janwhitaker.com

Our truest response to the irrationality of the world is to paint or 
sing or write, for only in such response do we find truth.
~Madeline L'Engle, writer

_ __________________ _



More information about the Link mailing list