![]() |
Security Flaws in Universal Plug and Play: Unplug, Don't Play
I have been following some of the recent exploits of UPnP for a couple of weeks now. The script kiddies have found easy ways of taking advantage of the vulns. They have realized that they can p0wn your Internet connection and possibly everything behind the router as well. Then, I saw this report that was released yesterday. The stats are amazing and scary.
We have all learned over the years to protect ourselves from malware and viruses. But, most people will install a home router and not think about it because they tend to just work. I have found that a high percentage of consumer-grade routers have UPnP enabled by default. Take a couple of minutes and read this link. https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play There is also a link to a Windows tool in the article that helps you to identify if you are vulnerable. There are also instructions for using Metasploit for Mac and Linux users. I recommend that you scan your devices whether they be something you purchased or something that your ISP has provided. (there are reports of some Verizon FIOS devices being vulnerable). If you run the scan and it reports that your equipment is vulnerable, don't panic. First, disable UPnP on your device. Then check with the vendor to see if they have any firmware updates for your device. http://forums.pelicanparts.com/uploa...1359551036.jpg |
I saw that report too and surprised it was news. Since UPnP was cerated it was always exploitable. I guess the surprising thing is these vendors are allowing it on the WAN/internet interface....
|
I tried to run the scanner provided in the link, and I got an error "Registration Servers cannot be reached"
|
Quote:
|
What does all this mean in english? Is this a setting on the wifi router that needs turned off? I am leary of running a third party app on my computer that tells me I have security flaws.
|
Quote:
|
Quote:
At face value, this ScanNow tool from rapid7.com appears to be a thinly-veiled collector for sales leads and marketing data. |
My external router has upnp disabled, on my internal switch it's available. Upnp and most other types of traffic can't leave the DMZ to get to the broadband router.
|
go to Tools or setup or similar after you log in to your router
your router will be at 128.168.1.1 or similar - plug that into your browser |
I've always disabled UPnP on my hardware and computers as early as possible. Exploits for UPnP have been around as long as UPnP has been around. Must have been implemented by the same guys who thought ActiveX controls with no security controls were a great idea.
|
Quote:
|
The simplest solution is to redirect all traffic to 127.0.0.1
|
Quote:
|
Quote:
|
That scan software requires JAVA to be installed. Nope....
|
Quote:
|
yes, 192.168....
thx Dave |
You think UPnP is bad ............. Verizon installs WEP by default on all there FIOS installs
|
Quote:
|
All times are GMT -8. The time now is 02:50 PM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
Search Engine Optimization by vBSEO 3.6.0
Copyright 2025 Pelican Parts, LLC - Posts may be archived for display on the Pelican Parts Website