Massive security hole lets hackers control millions of cameras, printers and routers
Source: Raw Story
A newly discovered exploit in a technology standard known as universal plug and play (UPnP) is big enough that hackers on the Internet could remotely access and control millions of compatible devices like cameras, printers and routers, security researchers said Tuesday.
Researchers working for the security firm Rapid7 said they found bugs in the UPnP standard that exposes personal devices to being remotely accessed and controlled. That means an enterprising hacker could, say, exploit the bug to print unwanted messages on a personal printer, or turn on a webcam unbeknownst to the owner.
A hole this large has likely already been exploited on a selective, individual basis, researchers warned, noting that something like 40 to 50 million network devices make use of UPnP.
Rapid7?s announcement was confirmed Tuesday night by the United States Computer Emergency Readiness Team (US-CERT), which warned that hundreds of vendors that supply network-enabled hardware rely upon UPnP, including major firms like Ciscos Linksys, D-Link, Belkin and Netgear. The agency recommended those manufacturers begin immediately updating their software to close the vulnerability a process which could take months.
Read more: http://www.rawstory.com/rs/2013/01/30/massive-security-hole-lets-hackers-control-millions-of-cameras-printers-and-routers/
DainBramaged
(39,191 posts)There were holes discovered in Barracuda networks hardware recently, all because they source product from China instead of the US.
https://krebsonsecurity.com/2013/01/backdoors-found-in-barracuda-networks-gear/
variety of the latest firewall, spam filter and VPN appliances sold by Campbell, Calif. based Barracuda Networks Inc. contain undocumented backdoor accounts, the company disclosed today. Worse still, while the backdoor accounts are apparently set up so that they would only be accessible from Internet addresses assigned to Barracuda, they are in fact accessible to potentially hundreds of other companies and network owners.
Barracudas hardware devices are broadly deployed in corporate environments, including the Barracuda Web Filter, Message Archiver, Web Application Firewall, Link Balancer, and SSL VPN. Stefan Viehböck, a security researcher at Vienna, Austria-based SEC Consult Vulnerability Lab., discovered in November 2012 that these devices all included undocumented operating system accounts that could be used to access the appliances remotely over the Internet via secure shell (SSH).
Viehböck found that the username product could be used to login and gain access to the devices MySQL database (root@localhost) with no password, which he said would allow an attacker to add new users with administrative privileges to the appliances. SEC Consult found a password file containing a number of other accounts and hashed passwords, some of which were uncomplicated and could be cracked with little effort.
Viehböck said he soon found that these devices all were configured out-of-the-box to listen for incoming SSH connections on those undocumented accounts, but that the devices were set to accept connection attempts only from Internet address ranges occupied by Barracuda Networks. Unfortunately, Barracuda is not the only occupant of these ranges. Indeed, a cursory lookup of the address ranges at network mapping site Robtex.com shows there are potentially hundreds of other companies running Web sites and other online operations in the same space.
ProfessionalLeftist
(4,982 posts)It's a different issue, it seems.
benld74
(9,904 posts)RILib
(862 posts)Remote control that, hackers.
Have done so ever since I read about how they can be turned on remotely. Ew.
If I want to Skype someone, the Post-It is easy to remove.
truthisfreedom
(23,148 posts)And I'm not kidding.
dixiegrrrrl
(60,010 posts)ProfessionalLeftist
(4,982 posts)I found this tool on this page: https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play
reACTIONary
(5,770 posts)ProfessionalLeftist
(4,982 posts)AmyDeLune
(1,846 posts)Strange peoples could be watching me read the internets while eating M&M's!!1!!
(remind self to yawn and pick nose more often...)
ProfessionalLeftist
(4,982 posts)" at least 23 million of the devices are susceptible to full takeover by hackers, potentially becoming a jumping-off point for an attack on the victims network behind any firewall."
http://www.forbes.com/sites/andygreenberg/2013/01/29/disable-a-protocol-called-upnp-on-your-router-now-to-avoid-a-serious-set-of-security-bugs/
The tools by by Rapid 7, the security firm that discovered the issue (I linked to one of them above), are worth using, besides disabling UPnP on your devices.
Xithras
(16,191 posts)...many people, like myself, have uPnP printers that store many of our printed documents. I can pull up any of the last 25 documents I've printed and reprint them without my computer even being on. If someone gets uPnP control of my printer, they can see everything I print.
That's not a showstopper for me, but I know plenty of small business owners who print payroll and other "sensitive" documents from their printers, who could be devastated by a remote breach like this.
The routers may be a bigger concern though. If they can breach your router, they can potentially intercept every bit of traffic on your network. That might include VoIP phone calls, traffic from wifi connected phones and devices, AND your M&M munching browsing sessions.