Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

IDemo

(16,926 posts)
Wed Jan 30, 2013, 05:18 PM Jan 2013

Massive security hole lets hackers control millions of cameras, printers and routers

Source: Raw Story

A newly discovered exploit in a technology standard known as “universal plug and play” (UPnP) is big enough that hackers on the Internet could remotely access and control “millions” of compatible devices like cameras, printers and routers, security researchers said Tuesday.

Researchers working for the security firm Rapid7 said they found bugs in the UPnP standard that exposes personal devices to being remotely accessed and controlled. That means an enterprising hacker could, say, exploit the bug to print unwanted messages on a personal printer, or turn on a webcam unbeknownst to the owner.

A hole this large has likely already been exploited on a selective, individual basis, researchers warned, noting that something like 40 to 50 million network devices make use of UPnP.

Rapid7?s announcement was confirmed Tuesday night by the United States Computer Emergency Readiness Team (US-CERT), which warned that “hundreds of vendors” that supply network-enabled hardware rely upon UPnP, including major firms like Cisco’s Linksys, D-Link, Belkin and Netgear. The agency recommended those manufacturers begin immediately updating their software to close the vulnerability — a process which could take months.




Read more: http://www.rawstory.com/rs/2013/01/30/massive-security-hole-lets-hackers-control-millions-of-cameras-printers-and-routers/

14 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Massive security hole lets hackers control millions of cameras, printers and routers (Original Post) IDemo Jan 2013 OP
The problem is, the system has to be so badly compromised that they could attack a singular PC DainBramaged Jan 2013 #1
As I understand it, This has nothing to to with the UPnP bug ProfessionalLeftist Feb 2013 #8
I can SEE you!!!!! benld74 Jan 2013 #2
You don't have a piece of tape over your webcam? RILib Jan 2013 #3
Post-It note Hekate Feb 2013 #11
I have a piece of tape with tinfoil in the middle over my webcam. truthisfreedom Feb 2013 #12
I feel left out..I don't seem to have a web cam. dixiegrrrrl Feb 2013 #13
Scan your home router from the internet with this tool: ProfessionalLeftist Jan 2013 #4
I would never direct a tool on the internet to scan my anything. (nt) reACTIONary Jan 2013 #6
Suit yourself. n/t ProfessionalLeftist Feb 2013 #7
Oh Noes!!1! AmyDeLune Jan 2013 #5
It's a little more serious than that... ProfessionalLeftist Feb 2013 #10
In addition to the other comments... Xithras Feb 2013 #14
You do know where this is leading, don't you? Ian Iam Feb 2013 #9

DainBramaged

(39,191 posts)
1. The problem is, the system has to be so badly compromised that they could attack a singular PC
Wed Jan 30, 2013, 05:50 PM
Jan 2013

There were holes discovered in Barracuda networks hardware recently, all because they source product from China instead of the US.


https://krebsonsecurity.com/2013/01/backdoors-found-in-barracuda-networks-gear/


variety of the latest firewall, spam filter and VPN appliances sold by Campbell, Calif. based Barracuda Networks Inc. contain undocumented backdoor accounts, the company disclosed today. Worse still, while the backdoor accounts are apparently set up so that they would only be accessible from Internet addresses assigned to Barracuda, they are in fact accessible to potentially hundreds of other companies and network owners.

Barracuda’s hardware devices are broadly deployed in corporate environments, including the Barracuda Web Filter, Message Archiver, Web Application Firewall, Link Balancer, and SSL VPN. Stefan Viehböck, a security researcher at Vienna, Austria-based SEC Consult Vulnerability Lab., discovered in November 2012 that these devices all included undocumented operating system accounts that could be used to access the appliances remotely over the Internet via secure shell (SSH).

Viehböck found that the username “product” could be used to login and gain access to the device’s MySQL database (root@localhost) with no password, which he said would allow an attacker to add new users with administrative privileges to the appliances. SEC Consult found a password file containing a number of other accounts and hashed passwords, some of which were uncomplicated and could be cracked with little effort.

Viehböck said he soon found that these devices all were configured out-of-the-box to listen for incoming SSH connections on those undocumented accounts, but that the devices were set to accept connection attempts only from Internet address ranges occupied by Barracuda Networks. Unfortunately, Barracuda is not the only occupant of these ranges. Indeed, a cursory lookup of the address ranges at network mapping site Robtex.com shows there are potentially hundreds of other companies running Web sites and other online operations in the same space.

Hekate

(90,737 posts)
11. Post-It note
Fri Feb 1, 2013, 03:43 AM
Feb 2013

Have done so ever since I read about how they can be turned on remotely. Ew.

If I want to Skype someone, the Post-It is easy to remove.

AmyDeLune

(1,846 posts)
5. Oh Noes!!1!
Wed Jan 30, 2013, 11:48 PM
Jan 2013

Strange peoples could be watching me read the internets while eating M&M's!!1!!
(remind self to yawn and pick nose more often...)

ProfessionalLeftist

(4,982 posts)
10. It's a little more serious than that...
Fri Feb 1, 2013, 02:06 AM
Feb 2013

" at least 23 million of the devices are susceptible to full takeover by hackers, potentially becoming a jumping-off point for an attack on the victim’s network behind any firewall."

http://www.forbes.com/sites/andygreenberg/2013/01/29/disable-a-protocol-called-upnp-on-your-router-now-to-avoid-a-serious-set-of-security-bugs/

The tools by by Rapid 7, the security firm that discovered the issue (I linked to one of them above), are worth using, besides disabling UPnP on your devices.

Xithras

(16,191 posts)
14. In addition to the other comments...
Fri Feb 1, 2013, 01:08 PM
Feb 2013

...many people, like myself, have uPnP printers that store many of our printed documents. I can pull up any of the last 25 documents I've printed and reprint them without my computer even being on. If someone gets uPnP control of my printer, they can see everything I print.

That's not a showstopper for me, but I know plenty of small business owners who print payroll and other "sensitive" documents from their printers, who could be devastated by a remote breach like this.

The routers may be a bigger concern though. If they can breach your router, they can potentially intercept every bit of traffic on your network. That might include VoIP phone calls, traffic from wifi connected phones and devices, AND your M&M munching browsing sessions.

Latest Discussions»Latest Breaking News»Massive security hole let...