New SOHO Router Security Audit Uncovers Over 60 Flaws In 22 Models 66
Home and small-office routers have become a hotbed for security research lately, with vulnerabilities and poor security practices becoming the rule, rather than the exception. A new security audit by researchers from Universidad Europea de Madrid only adds to that list, finding 60 distinct flaws in 22 different device models. They posted details of their research on the Full Disclosure mailing list, and the affected brands include D-Link, Belkin, Linksys, Huawei, and others. Many of the models they examined had been distributed to internet customers across Spain by their ISPs. About half of the flaws involve Cross Site Scripting and Cross Site Request Forgery capabilities, though there is at least one backdoor with a hard-coded password. Several routers allow external attackers to delete files on USB storage devices, and others facilitate DDoS attacks.
What? Again? (Score:1)
How can this be? I pays good money for good stuffs. Dlink is goods?
Re: (Score:3)
D = dropped
Re: (Score:2)
About as much as you do with Self-Organising Holarchic Open Systems.
Re: (Score:2)
Re: (Score:2)
They are missing a few. (Score:4, Interesting)
Netgear has some major security flaws they they've refused to address for a long time. Mainly direct remote access. I'm not sure if this is by design via the NSA or because they are horrifically lazy, but I stopped caring what they thought and installed Linux on my router. Openwrt and dd-wrt work better than the original in most cases, except in the realm of tx power modification. That seems to have sucked since people started frying their antenna's and the dev's stopped pursuing it.
Re: (Score:2)
Which models are these in Netgear?
Better than expected... (Score:2)
Re: (Score:1)
That would imply they were at least a bit organized.
Re: (Score:2)
"Video Bytes"? (Score:4, Insightful)
Re: (Score:2)
Oh, someone wants them. Just not the Slashdot community.
Re: (Score:2)
I'm already glad I don't know what it is. Not going to look it up, either.
Re: (Score:2)
Okay. Now I know. It's that stupid-looking video bar thing mid-page that I've been scrolling past by reflex for the last few days.
OK (Score:5, Insightful)
Most of you /.'ers that have read my comments know that I like to dis Apple, can't stand the fucking fanbois, but I have yet to see the Airport listed in any of these articles.
If you have point it out to me, it seems they are fairly sound devices.
Re:OK (Score:5, Informative)
...right out of the AirPort Extreme manual?
To set up your AirPort Extreme using a Mac, you need the following:
A Mac computer with an AirPort or AirPort Extreme Card installed to set it up wirelessly, or a Mac computer connected to an AirPort Extreme Base Station with an Ethernet cable to set it up using Ethernet
To set up your AirPort Extreme using a Windows PC, you need the following:
A Windows PC with 300 MHz or higher processor speed and a compatible 802.11a, 802.11b, 802.11g, or 802.11n wireless card to set it up wirelessly, or a Windows computer connected to an AirPort Extreme Base Station with an Ethernet cable to set it up using Ethernet
I own several AirPort Extreme/Express devices...range and performance are just as good as other premium consumer-brand routers and access points. I have several Extremes sitting in an 802.1x environment...rock solid reliability and performance. If I had one complaint, it would be that the radio is a bit noisy...in a quiet room, you can often hear a tinny squeal when under load.
Re: OK (Score:2)
Re: (Score:2)
Re: (Score:1)
Yea, Apple makes itself known as selling a rather expensive Airport Extreme router. But they do work harder at firmware and issues. But they are not without problems only the Apple stuff is not nearly as popular as Netgear, Linksys, or some others.
Re: (Score:1)
Re:OK (Score:5, Insightful)
Oh, they've had a few (Secunia's down for me at the moment, but there's a reasonably up-to-date list here [packetstormsecurity.com]), so they're not perfect - but yes, they seem on the whole to have their act together.
Sure, they're not as configurable as a cheap Linksys (although they can be pushed to do anything you'd reasonably* expect a home/SOHO router to do), you can't shoehorn Linux onto them, and the lack of a CLI or web interface (a OSX / Win only config utility) is shitty - but they're solid, robust, & pretty secure devices which are almost perfect for the average home or SOHO user.
Oh, and the AC who said "Cannot configure them via a wired port, only wireless (wtf?)" is either a troll or an idiot...
(* running a server, packet inspection, or doing heavily customised routing is not a reasonable expectation for a home/SOHO router - that sort of thing belongs on a separate machine that doesn't have one testicle dangling out on the WAN...)
Re: (Score:2)
the lack of a CLI or web interface (a OSX / Win only config utility) is shitty
..is a total non-starter for me. I broadly speaking like Apple, but they do some really stupid things sometimes and this is most definitely one of them.
Only? wait for IOT (Score:2)
Re: (Score:3, Funny)
Due to the number of growing exploits against SOHO routers, SmartTVs, UEFI firmware, etc... we at work now tend to refer to IoT as BoT... aka Internet of Things == BotNet of Things...
And it's a simple case of not if, but when this will happen...
Re: (Score:2)
Oooh, and it's even recursive.
Stuff is crap anymore (Score:1)
Let's face it, manufactures make stuff for pennies and sell it for as much as they can with as little support and warranty as they can. Notice how you can hardly talk to anyone about a issue without handing over a credit card. Firmware is as flimsy as the antenna these routers use. Nothing about a router seems well built, they skimp on heat sinks and shielding and wonder why their is so much interference? Throw the FCC a few bucks and they pretty much pass anything. Even then the FCC cares so little about s
Only concerns ISP-specific models (Score:3, Insightful)
Past research has shown that the security of ISP-provided routers is often worse than that of off-the-shelf ones. Many such devices are configured for remote administration to allow ISPs to remotely update their settings or troubleshoot connection problems. This exposes the routers’ management interfaces along with any vulnerabilities in them to the Internet, increasing the risk of exploitation.
So, in other words, these models were specifically made for and distributed by an ISP, and were not off-the-shelf models. The backdoors were there for the ISP managers. For 99% of network users out there, these vulnerabilities are of no practical concern.
Re:Only concerns ISP-specific models (Score:4, Informative)
Well, I trust my ISPs router ... well, not at all, actually.
Because I assume my ISP is either incompetent or dishonest, I don't really care which, I simply don't trust them. And I sure as fuck don't trust them with access to my actual network. I want a layer of security between me and their shit, because I assume their stuff is trivially hacked.
My wife and I each have our offices set up where our own router is getting DHCP from the ISPs router, and then firewalling everything from it. We each have our own locked down wifi, and entirely separate networks. I'm pondering a third router to provide the guest wifi.
Other than disabling the ISPs wifi and using our own, I wouldn't even know the SSID or the password for the ISPs crap. I assume they haven't turned it on without asking, but I never check -- come to think of it, I'd have to find out how.
My parents and my in-laws have routers we've bought them to sit behind the crap the ISP provides. Because I know for a fact that in both cases the ISP provides a router with default wifi SSID and passwords which are published in the docs they give you.
Because it's printed in the "how to" for every damned subscriber, and you can't change it, you can pretty much imagine that if you find an SSID of the right name you can connect to it, and probably have management access to it.
But the problem is so many households trust that the wide open, back doored, well known remote-admin credentialed, shitty routers they've been provided with give them any form of security.
Which means for the overwhelming majority of home users who aren't tech savvy and paranoid, these vulnerabilities are absolutely of practical concern ... because their PCs are directly plugged into the ISPs router, or they're using wifi from the ISPs router.
I'm betting a lot of home users figure they have the router from the ISP, so they don't need anything else.
That these are ISP models doesn't diminish the number of people who could be impacted ... it greatly magnifies it. Because most people who don't know better (and a few who do) connect their PC directly to the ISPs router.
Honestly, go talk to a random neighbor .. see if they have anything between them and their ISPs router. My best is they don't.
Re: (Score:2)
Re: (Score:1)
bad info on D-Link DSL-2750B? (Score:1)
described attack and info URL doesn't work on my unit
Re: (Score:2)
I was running OpenWRT on a WRT54GS, but moved and ended up with 50Mbit Comcast (crap) rather than ~2Mbit Sonic.net (awesome! but too damn slow due to distance from CO). If discovered the WRT was limiting thruput to ~12Mbit rather than the 50Mbit I had on the other side of it, so I'm using an Apple Airport Express with stock firmware until I can get OpenWRT setup on a Netgear WNDR3700.
And I thought I was way behind the times when i was still running the WRT54GS. So I guess my question is, is anyone still ru
Here we go again (Score:1)
Re: (Score:3)
Not at all. I'm completely open to security flaws in products. But only if the company supports the products fixes the flaws and provides continuous updates for older gear.
I am for instance very tolerant of Windows or Linux based security flaws, I am tolerant for flaws in iOS too. But I expect my Android devices and my home router to be flawless considering the manufactures provide bugger all support after their sale.
Death Will Not Release You. (Score:2)
... not letting me delete my account.
Slashdot is like the Mafia, CIA, and the Los Angeles Science Fiction Society: Once a member, ALWAYS a member.
As LASFS says: "Death Will Not Release You."
Re: (Score:2)
Delete your account means what?
Scientology is the only reason that some data has been deleted from Slashdot. But your account is here because why?
Just stop visiting here. Or delete your cookies. Or be responsible for what you have posted. Or you can just plead "I was drunk."
Delete your account has the follow-on effects of, what exactly? What is it that you wish to omit from the record?
Or is it everything? Because unless you are a Scientologist with lots of money, probably nothing will be removed other
Minimum standards (Score:4, Insightful)
Really, there ought to be some sensible minimum standards for commercial products that can be connected to the internet. This could include that the company had a decent policy for security fixes and a published contact point for people reporting such problems.
And how about a pre-published, minimum security support length, so that people buying a smartphone/router/etc. will know in advance how many years it will be supported with security fixes. There are "use by" dates on food, why not on all internet connected devices.
Re: (Score:2)
Re: (Score:2)
Not necessarily. The alternative to no laws isn't bad laws.
As it is now companies can spew out insecure products with impunity and even silently drop any security support for devices consumers have just bought, not forgetting the classic tactic of not acknowledging security problems and just plain ignoring them. This can't go on.
Re: (Score:2)
Re: (Score:1)
Yeah, but can you stop the NSA (Score:3)
Does anyone know of a SOHO package that can keep out the three letter agencies? I'm pretty sure even if these SOHO routers had stellar security does anyone believe they could keep out the NSA or a determined attacker from compromising your network? Even the best models basically just have a linux distro running iptables.
Re: (Score:3, Informative)
Linux "just running iptables" is perfectly secure.
In general you cant just hack firewall software directly. What you do is find a protocol that is allowed through the firewall and then exploit some vulnerability on that protocol. Examples would be default passwords or SQL injection in a web management interface, buffer overflows in a DNS response, weak encryption in a VPN etc.
Re: (Score:2)
Re: (Score:2)
You can't escape hardware based exploits/backdoors. There's a lot of silicon in these things to hide in.
Hmm, it would be fun to build an arduino based router. I suspect someone already did... But I think this would be the only way to reduce the amount of silicon.
Hiding a generic backdoor in an atmega chip that plays well with a generic backdoor in say an ethernet and/or wifi processing chip would be an accomplishment.
Re: (Score:2)
Re: (Score:2)
Just to be fair "perfectly secure" is probably overstating things considerably. It would pass "no known exploits" pretty well, certainly "commercially viable".
The only "perfectly secure" computer is off, unplugged from the Internet, and encased in 50 feet of reinforced concrete. And even then, there *are* ways to exploit it using *ahem* brute force...
Re: (Score:1)
You won't keep out the NSA. Defeating a state actor with funding and technical competence that exceeds your own in ways that you can't imagine is not a realistic goal, especially when they have allied state actors (FBI/local law enforcement) who can infiltrate/burgle your premises and gain physical access to your boxen. If they want you, they will have you, and if you make it hard for them, they'll find a charge to have your stuff picked up for inspection and you thrown in detention long enough to break
Re: (Score:2)
Forget it, they have exploits for every programmable machine you can possibly imagine.
Basic security (Score:1)
Some of these flaws (maybe all) can be accessed by default logins. As soon as you have passed that, you have full control. To help prevent that you can change the device's IP and give it unique login credentials. It won't stop someone determined who wants access as all it needs is brute force to find the device's IP login page. In other words some of the vulnerabilities aren't device issues but user responsibilities. That pretty much goes for non-isp supplied routers.
A few ISP supplied routers do have backd
Wouldn't it be shorter to list secure products? (Score:1)
All browser vulnerabilities .. (Score:1)