<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Home Routers a Big Consumer Cyberthreat?</title>
	<atom:link href="http://www.epanorama.net/blog/2014/02/20/home-routers-a-big-consumer-cyberthreat/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/02/20/home-routers-a-big-consumer-cyberthreat/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 23 Apr 2026 12:41:17 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/20/home-routers-a-big-consumer-cyberthreat/comment-page-2/#comment-1585329</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 19 Mar 2018 09:42:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24888#comment-1585329</guid>
		<description><![CDATA[Remotely Exploitable Vulnerability Discovered in MikroTik&#039;s RouterOS 
https://www.securityweek.com/remotely-exploitable-vulnerability-discovered-mikrotiks-routeros

A vulnerability exists in MikroTik&#039;s RouterOS in versions prior to the latest 6.41.3, released Monday, March 12, 2018. Details were discovered February and disclosed by Core Security on Thursday.

MikroTik is a Latvian manufacturer that develops routers and software used throughout the world. RouterOS is its Linux-based operating system.

The vulnerability, a MikroTik RouterOS SMB buffer overflow flaw, allows a remote attacker with access to the service to gain code execution on the system. Since the overflow occurs before authentication, an unauthenticated remote attacker can exploit it.]]></description>
		<content:encoded><![CDATA[<p>Remotely Exploitable Vulnerability Discovered in MikroTik&#8217;s RouterOS<br />
<a href="https://www.securityweek.com/remotely-exploitable-vulnerability-discovered-mikrotiks-routeros" rel="nofollow">https://www.securityweek.com/remotely-exploitable-vulnerability-discovered-mikrotiks-routeros</a></p>
<p>A vulnerability exists in MikroTik&#8217;s RouterOS in versions prior to the latest 6.41.3, released Monday, March 12, 2018. Details were discovered February and disclosed by Core Security on Thursday.</p>
<p>MikroTik is a Latvian manufacturer that develops routers and software used throughout the world. RouterOS is its Linux-based operating system.</p>
<p>The vulnerability, a MikroTik RouterOS SMB buffer overflow flaw, allows a remote attacker with access to the service to gain code execution on the system. Since the overflow occurs before authentication, an unauthenticated remote attacker can exploit it.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/20/home-routers-a-big-consumer-cyberthreat/comment-page-2/#comment-1584611</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 13 Mar 2018 15:45:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24888#comment-1584611</guid>
		<description><![CDATA[&#039;Slingshot&#039; Malware That Hid For Six Years Spread Through Routers
https://it.slashdot.org/story/18/03/12/2034219/slingshot-malware-that-hid-for-six-years-spread-through-routers

Security researchers at Kaspersky Lab have discovered what&#039;s likely to be another state-sponsored malware strain, and this one is more advanced than most. Nicknamed Slingshot, the code spies on PCs through a multi-layer attack that targets MikroTik routers. It first replaces a library file with a malicious version that downloads other malicious components, and then launches a clever two-pronged attack on the computers themselves.


Sophisticated malware attacks through routers
It&#039;s likely the creation of a government surveillance agency.
https://www.engadget.com/2018/03/11/sophisticated-malware-attacks-through-routers/

Security researchers at Kaspersky Lab have discovered what&#039;s likely to be another state-sponsored malware strain, and this one is more advanced than most. Nicknamed Slingshot, the code spies on PCs through a multi-layer attack that targets MikroTik routers. It first replaces a library file with a malicious version that downloads other malicious components, and then launches a clever two-pronged attack on the computers themselves. One, Canhadr, runs low-level kernel code that effectively gives the intruder free rein, including deep access to storage and memory; the other, GollumApp, focuses on the user level and includes code to coordinate efforts, manage the file system and keep the malware alive.

Kaspersky describes these two elements as &quot;masterpieces,&quot; and for good reason. For one, it&#039;s no mean feat to run hostile kernel code without crashes. Slingshot also stores its malware files in an encrypted virtual file system, encrypts every text string in its modules, calls services directly (to avoid tripping security software checks) and even shuts components down when forensic tools are active.]]></description>
		<content:encoded><![CDATA[<p>&#8216;Slingshot&#8217; Malware That Hid For Six Years Spread Through Routers<br />
<a href="https://it.slashdot.org/story/18/03/12/2034219/slingshot-malware-that-hid-for-six-years-spread-through-routers" rel="nofollow">https://it.slashdot.org/story/18/03/12/2034219/slingshot-malware-that-hid-for-six-years-spread-through-routers</a></p>
<p>Security researchers at Kaspersky Lab have discovered what&#8217;s likely to be another state-sponsored malware strain, and this one is more advanced than most. Nicknamed Slingshot, the code spies on PCs through a multi-layer attack that targets MikroTik routers. It first replaces a library file with a malicious version that downloads other malicious components, and then launches a clever two-pronged attack on the computers themselves.</p>
<p>Sophisticated malware attacks through routers<br />
It&#8217;s likely the creation of a government surveillance agency.<br />
<a href="https://www.engadget.com/2018/03/11/sophisticated-malware-attacks-through-routers/" rel="nofollow">https://www.engadget.com/2018/03/11/sophisticated-malware-attacks-through-routers/</a></p>
<p>Security researchers at Kaspersky Lab have discovered what&#8217;s likely to be another state-sponsored malware strain, and this one is more advanced than most. Nicknamed Slingshot, the code spies on PCs through a multi-layer attack that targets MikroTik routers. It first replaces a library file with a malicious version that downloads other malicious components, and then launches a clever two-pronged attack on the computers themselves. One, Canhadr, runs low-level kernel code that effectively gives the intruder free rein, including deep access to storage and memory; the other, GollumApp, focuses on the user level and includes code to coordinate efforts, manage the file system and keep the malware alive.</p>
<p>Kaspersky describes these two elements as &#8220;masterpieces,&#8221; and for good reason. For one, it&#8217;s no mean feat to run hostile kernel code without crashes. Slingshot also stores its malware files in an encrypted virtual file system, encrypts every text string in its modules, calls services directly (to avoid tripping security software checks) and even shuts components down when forensic tools are active.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/20/home-routers-a-big-consumer-cyberthreat/comment-page-2/#comment-1581317</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 09 Feb 2018 09:58:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24888#comment-1581317</guid>
		<description><![CDATA[Flaws Affecting Top-Selling Netgear Routers Disclosed
http://www.securityweek.com/flaws-affecting-top-selling-netgear-routers-disclosed

Security firm Trustwave has disclosed the details of several vulnerabilities affecting Netgear routers, including devices that are top-selling products on Amazon and Best Buy.

The flaws were discovered by researchers in March 2017 and they were patched by Netgear in August, September and October.

One of the high severity vulnerabilities has been described as a password recovery and file access issue affecting 17 Netgear routers and modem routers, including best-sellers such as R6400, R7000 (Nighthawk), R8000 (Nighthawk X6), and R7300DST (Nighthawk DST).]]></description>
		<content:encoded><![CDATA[<p>Flaws Affecting Top-Selling Netgear Routers Disclosed<br />
<a href="http://www.securityweek.com/flaws-affecting-top-selling-netgear-routers-disclosed" rel="nofollow">http://www.securityweek.com/flaws-affecting-top-selling-netgear-routers-disclosed</a></p>
<p>Security firm Trustwave has disclosed the details of several vulnerabilities affecting Netgear routers, including devices that are top-selling products on Amazon and Best Buy.</p>
<p>The flaws were discovered by researchers in March 2017 and they were patched by Netgear in August, September and October.</p>
<p>One of the high severity vulnerabilities has been described as a password recovery and file access issue affecting 17 Netgear routers and modem routers, including best-sellers such as R6400, R7000 (Nighthawk), R8000 (Nighthawk X6), and R7300DST (Nighthawk DST).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/20/home-routers-a-big-consumer-cyberthreat/comment-page-2/#comment-1575664</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 27 Dec 2017 10:34:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24888#comment-1575664</guid>
		<description><![CDATA[Mirai Variant &quot;Satori&quot; Targets Huawei Routers
http://www.securityweek.com/mirai-variant-satori-targets-huawei-routers

Hundreds of thousands of attempts to exploit a recently discovered vulnerability in Huawei HG532 home routers have been observed over the past month, Check Point security researchers warn. 

The attacks were trying to drop Satori, an updated variant of the notorious Mirai botnet that managed to wreak havoc in late 2016. Targeting port 37215 on Huawei HG532 devices, the assaults were observed all around the world, including the USA, Italy, Germany and Egypt, the researchers say. 

Common to these incidents was the attempt to exploit CVE-2017-17215, a zero-day vulnerability in the Huawei home router residing in the fact that the TR-064 technical report standard, which was designed and intended for local network configuration, was exposed to WAN through port 37215 (UPnP - Universal Plug and Play). 

The affected device supports a service type named `DeviceUpgrade`, which is supposedly carrying out firmware upgrade actions. By injecting shell meta-characters “$()” in two elements with which the upgrade is carried out, a remote administrator could execute arbitrary code on the affected devices.]]></description>
		<content:encoded><![CDATA[<p>Mirai Variant &#8220;Satori&#8221; Targets Huawei Routers<br />
<a href="http://www.securityweek.com/mirai-variant-satori-targets-huawei-routers" rel="nofollow">http://www.securityweek.com/mirai-variant-satori-targets-huawei-routers</a></p>
<p>Hundreds of thousands of attempts to exploit a recently discovered vulnerability in Huawei HG532 home routers have been observed over the past month, Check Point security researchers warn. </p>
<p>The attacks were trying to drop Satori, an updated variant of the notorious Mirai botnet that managed to wreak havoc in late 2016. Targeting port 37215 on Huawei HG532 devices, the assaults were observed all around the world, including the USA, Italy, Germany and Egypt, the researchers say. </p>
<p>Common to these incidents was the attempt to exploit CVE-2017-17215, a zero-day vulnerability in the Huawei home router residing in the fact that the TR-064 technical report standard, which was designed and intended for local network configuration, was exposed to WAN through port 37215 (UPnP &#8211; Universal Plug and Play). </p>
<p>The affected device supports a service type named `DeviceUpgrade`, which is supposedly carrying out firmware upgrade actions. By injecting shell meta-characters “$()” in two elements with which the upgrade is carried out, a remote administrator could execute arbitrary code on the affected devices.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/20/home-routers-a-big-consumer-cyberthreat/comment-page-2/#comment-1564248</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 25 Sep 2017 14:04:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24888#comment-1564248</guid>
		<description><![CDATA[Insteon and Wink home hubs appear to have a problem with encryption
Which is to say neither do it
https://www.theregister.co.uk/2017/09/25/home_hub_insecurity/

Security researchers have discovered that two popular home automation systems are vulnerable to attacks.

The Insteon Hub and Wink Hub 2 are designed to connect various home products and manage automation, and the flaws represent another entry in the growing catalogue of IoT security shortcomings.

Rapid7 discovered two unpatched issues related to authentication and radio transmission security of the Insteon Hub. Firstly the account login and passwords for both Insteon services and the Hub hardware are stored unencrypted. In addition the radio transmissions between the hub and connected devices are unencrypted. This means malicious actors can easily capture the radio signals at any time to manipulate any device being managed via the Insteon Hub.]]></description>
		<content:encoded><![CDATA[<p>Insteon and Wink home hubs appear to have a problem with encryption<br />
Which is to say neither do it<br />
<a href="https://www.theregister.co.uk/2017/09/25/home_hub_insecurity/" rel="nofollow">https://www.theregister.co.uk/2017/09/25/home_hub_insecurity/</a></p>
<p>Security researchers have discovered that two popular home automation systems are vulnerable to attacks.</p>
<p>The Insteon Hub and Wink Hub 2 are designed to connect various home products and manage automation, and the flaws represent another entry in the growing catalogue of IoT security shortcomings.</p>
<p>Rapid7 discovered two unpatched issues related to authentication and radio transmission security of the Insteon Hub. Firstly the account login and passwords for both Insteon services and the Hub hardware are stored unencrypted. In addition the radio transmissions between the hub and connected devices are unencrypted. This means malicious actors can easily capture the radio signals at any time to manipulate any device being managed via the Insteon Hub.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/20/home-routers-a-big-consumer-cyberthreat/comment-page-2/#comment-1564218</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 25 Sep 2017 10:25:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24888#comment-1564218</guid>
		<description><![CDATA[Germany on Guard Against Election Hacks, Fake News
http://www.securityweek.com/germany-guard-against-election-hacks-fake-news

As the clock ticks down to elections Sunday, Germany&#039;s cyber defense nervously hopes it&#039;ll be third time lucky after Russia was accused of meddling in the US and French votes.

But even if Berlin avoids a last-minute bombshell of leaks or online sabotage, it sees Moscow&#039;s hand in fanning fears of Muslim migrants that are driving the rise of the hard-right.

Forecasters say Chancellor Angela Merkel is almost certain to win.

But she will also face, for the first time in German post-war history, a right-wing populist and anti-immigration party will have its own group on the opposition benches.]]></description>
		<content:encoded><![CDATA[<p>Germany on Guard Against Election Hacks, Fake News<br />
<a href="http://www.securityweek.com/germany-guard-against-election-hacks-fake-news" rel="nofollow">http://www.securityweek.com/germany-guard-against-election-hacks-fake-news</a></p>
<p>As the clock ticks down to elections Sunday, Germany&#8217;s cyber defense nervously hopes it&#8217;ll be third time lucky after Russia was accused of meddling in the US and French votes.</p>
<p>But even if Berlin avoids a last-minute bombshell of leaks or online sabotage, it sees Moscow&#8217;s hand in fanning fears of Muslim migrants that are driving the rise of the hard-right.</p>
<p>Forecasters say Chancellor Angela Merkel is almost certain to win.</p>
<p>But she will also face, for the first time in German post-war history, a right-wing populist and anti-immigration party will have its own group on the opposition benches.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/20/home-routers-a-big-consumer-cyberthreat/comment-page-2/#comment-1564217</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 25 Sep 2017 10:25:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24888#comment-1564217</guid>
		<description><![CDATA[D-Link Patches Recently Disclosed Router Vulnerabilities
http://www.securityweek.com/d-link-patches-recently-disclosed-router-vulnerabilities

D-Link has released firmware updates for its DIR-850L router to address a majority of the vulnerabilities disclosed recently by a security researcher.

Earlier this month, researcher Pierre Kim disclosed the details of several flaws affecting D-Link DIR-850L routers and the company’s mydlink cloud services. The expert decided to make his findings public without giving D-Link time to release fixes due to the way the vendor had previously handled patching and coordination.

D-Link has now released updates for both revision A and B of the firmware for DIR-850L devices. The company has provided detailed instructions for updating the firmware, which it says is a two-step process.

The vulnerabilities found by Kim include the lack of firmware protections, cross-site scripting (XSS), denial-of-service (DOS), and weaknesses that can be exploited to execute arbitrary commands.

D-Link also announced this week that a federal judge has dismissed three of the six counts in a complaint filed in January by the U.S. Federal Trade Commission (FTC) against the company over its alleged failure to implement proper security measures and making deceptive claims about the security of its products.]]></description>
		<content:encoded><![CDATA[<p>D-Link Patches Recently Disclosed Router Vulnerabilities<br />
<a href="http://www.securityweek.com/d-link-patches-recently-disclosed-router-vulnerabilities" rel="nofollow">http://www.securityweek.com/d-link-patches-recently-disclosed-router-vulnerabilities</a></p>
<p>D-Link has released firmware updates for its DIR-850L router to address a majority of the vulnerabilities disclosed recently by a security researcher.</p>
<p>Earlier this month, researcher Pierre Kim disclosed the details of several flaws affecting D-Link DIR-850L routers and the company’s mydlink cloud services. The expert decided to make his findings public without giving D-Link time to release fixes due to the way the vendor had previously handled patching and coordination.</p>
<p>D-Link has now released updates for both revision A and B of the firmware for DIR-850L devices. The company has provided detailed instructions for updating the firmware, which it says is a two-step process.</p>
<p>The vulnerabilities found by Kim include the lack of firmware protections, cross-site scripting (XSS), denial-of-service (DOS), and weaknesses that can be exploited to execute arbitrary commands.</p>
<p>D-Link also announced this week that a federal judge has dismissed three of the six counts in a complaint filed in January by the U.S. Federal Trade Commission (FTC) against the company over its alleged failure to implement proper security measures and making deceptive claims about the security of its products.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/20/home-routers-a-big-consumer-cyberthreat/comment-page-2/#comment-1563820</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 21 Sep 2017 20:17:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24888#comment-1563820</guid>
		<description><![CDATA[Judge Kills FTC Lawsuit Against D-Link for Flimsy Security 
https://yro.slashdot.org/story/17/09/21/1744203/judge-kills-ftc-lawsuit-against-d-link-for-flimsy-security

Earlier this year, the Federal Trade Commission filed a complaint against network equipment vendor D-Link saying inadequate security in the company&#039;s wireless routers and internet cameras left consumers open to hackers and privacy violations. The FTC, in a complaint filed in the Northern District of California charged that &quot;D-Link failed to take reasonable steps to secure its routers and Internet Protocol (IP) cameras, potentially compromising sensitive consumer information, including live video and audio feeds from D-Link IP cameras.&quot; 

Fast forward nine months, a judge has dismissed the FTC&#039;s case, claiming that the FTC failed to provide enough specific examples of harm done to consumers, or specific instances when the routers in question were breached.

 story category
Judge Kills FTC Lawsuit Against D-Link for Flimsy Security
http://www.dslreports.com/shownews/Judge-Kills-FTC-Lawsuit-Against-DLink-for-Flimsy-Security-140369]]></description>
		<content:encoded><![CDATA[<p>Judge Kills FTC Lawsuit Against D-Link for Flimsy Security<br />
<a href="https://yro.slashdot.org/story/17/09/21/1744203/judge-kills-ftc-lawsuit-against-d-link-for-flimsy-security" rel="nofollow">https://yro.slashdot.org/story/17/09/21/1744203/judge-kills-ftc-lawsuit-against-d-link-for-flimsy-security</a></p>
<p>Earlier this year, the Federal Trade Commission filed a complaint against network equipment vendor D-Link saying inadequate security in the company&#8217;s wireless routers and internet cameras left consumers open to hackers and privacy violations. The FTC, in a complaint filed in the Northern District of California charged that &#8220;D-Link failed to take reasonable steps to secure its routers and Internet Protocol (IP) cameras, potentially compromising sensitive consumer information, including live video and audio feeds from D-Link IP cameras.&#8221; </p>
<p>Fast forward nine months, a judge has dismissed the FTC&#8217;s case, claiming that the FTC failed to provide enough specific examples of harm done to consumers, or specific instances when the routers in question were breached.</p>
<p> story category<br />
Judge Kills FTC Lawsuit Against D-Link for Flimsy Security<br />
<a href="http://www.dslreports.com/shownews/Judge-Kills-FTC-Lawsuit-Against-DLink-for-Flimsy-Security-140369" rel="nofollow">http://www.dslreports.com/shownews/Judge-Kills-FTC-Lawsuit-Against-DLink-for-Flimsy-Security-140369</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/20/home-routers-a-big-consumer-cyberthreat/comment-page-2/#comment-1561448</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 04 Sep 2017 08:22:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24888#comment-1561448</guid>
		<description><![CDATA[Serious Vulnerabilities Disclosed in Modems Used by AT&amp;T&#039;s U-verse Service
http://www.securityweek.com/serious-vulnerabilities-disclosed-modems-used-atts-u-verse-service

Five vulnerabilities have been found in Arris-manufactured home networking equipment supplied in AT&amp;T&#039;s U-verse service. The vulnerabilities are considered so trivial to exploit that they have been disclosed to the public without waiting for remedial work from either Arris or AT&amp;T.

On one of the vulnerabilities, Joseph Hutchins of Nomotion Software reported yesterday, &quot;It is hard to believe that no one is already exploiting this vulnerability at the detriment of innocents. Which is why this report is not passing Go, not collecting $200, and is going straight to the public domain.&quot;

Arris has said that it is investigating the claims and cannot yet comment; but that it will take any necessary action to protect users of its devices.

It is worth noting that Arris is not a stranger to vulnerabilities -- a talk &quot;CableTap: Wireless Tapping Your Home Network&quot; was recently delivered at Def Con.

Right now, U-verse users should be aware that these are serious vulnerabilities. Tod Beardsley, Research Director at Rapid7, told SecurityWeek by email, they &quot;include three separate maintenance interfaces over SSH and two hidden HTTP-based services, all of which are reachable from the internet with hard-coded credentials and susceptible to command injection attacks. In addition, Nomotion discovered an unauthenticated firewall bypass vulnerability, which appears to be a rudimentary reverse TCP proxy, allowing unfettered access from the internet to computers on the LAN side. Any one of these vulnerabilities is disastrous for AT&amp;T U-Verse customers, since they ultimately bypass any security controls offered by these modems.&quot;]]></description>
		<content:encoded><![CDATA[<p>Serious Vulnerabilities Disclosed in Modems Used by AT&amp;T&#8217;s U-verse Service<br />
<a href="http://www.securityweek.com/serious-vulnerabilities-disclosed-modems-used-atts-u-verse-service" rel="nofollow">http://www.securityweek.com/serious-vulnerabilities-disclosed-modems-used-atts-u-verse-service</a></p>
<p>Five vulnerabilities have been found in Arris-manufactured home networking equipment supplied in AT&amp;T&#8217;s U-verse service. The vulnerabilities are considered so trivial to exploit that they have been disclosed to the public without waiting for remedial work from either Arris or AT&amp;T.</p>
<p>On one of the vulnerabilities, Joseph Hutchins of Nomotion Software reported yesterday, &#8220;It is hard to believe that no one is already exploiting this vulnerability at the detriment of innocents. Which is why this report is not passing Go, not collecting $200, and is going straight to the public domain.&#8221;</p>
<p>Arris has said that it is investigating the claims and cannot yet comment; but that it will take any necessary action to protect users of its devices.</p>
<p>It is worth noting that Arris is not a stranger to vulnerabilities &#8212; a talk &#8220;CableTap: Wireless Tapping Your Home Network&#8221; was recently delivered at Def Con.</p>
<p>Right now, U-verse users should be aware that these are serious vulnerabilities. Tod Beardsley, Research Director at Rapid7, told SecurityWeek by email, they &#8220;include three separate maintenance interfaces over SSH and two hidden HTTP-based services, all of which are reachable from the internet with hard-coded credentials and susceptible to command injection attacks. In addition, Nomotion discovered an unauthenticated firewall bypass vulnerability, which appears to be a rudimentary reverse TCP proxy, allowing unfettered access from the internet to computers on the LAN side. Any one of these vulnerabilities is disastrous for AT&amp;T U-Verse customers, since they ultimately bypass any security controls offered by these modems.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/02/20/home-routers-a-big-consumer-cyberthreat/comment-page-2/#comment-1551632</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 18 Jun 2017 19:00:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=24888#comment-1551632</guid>
		<description><![CDATA[Dan Goodin / Ars Technica:
WikiLeaks documents show how CIA infected WiFi routers from 10 manufacturers including D-Link and Linksys to monitor and manipulate traffic, infect more devices

Advanced CIA firmware has been infecting Wi-Fi routers for years
Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.
https://arstechnica.com/security/2017/06/advanced-cia-firmware-turns-home-routers-into-covert-listening-posts/

Home routers from 10 manufacturers, including Linksys, DLink, and Belkin, can be turned into covert listening posts that allow the Central Intelligence Agency to monitor and manipulate incoming and outgoing traffic and infect connected devices. That’s according to secret documents posted Thursday by WikiLeaks.

CherryBlossom, as the implant is code-named, can be especially effective against targets using some D-Link-made DIR-130 and Linksys-manufactured WRT300N models because they can be remotely infected even when they use a strong administrative password. An exploit code-named Tomato can extract their passwords as long as a default feature known as universal plug and play remains on. Routers that are protected by a default or easily-guessed administrative password are, of course, trivial to infect. In all, documents say CherryBlossom runs on 25 router models, although it’s likely modifications would allow the implant to run on at least 100 more.

The 175-page CherryBlossom user guide describes a Linux-based operating system that can run on a broad range of routers. Once installed, CherryBlossom turns the device into a “FlyTrap” that beacons a CIA-controlled server known as a “CherryTree.” The beacon includes device status and security information that the CherryTree logs to a database. In response, the CherryTree sends the infected device a “Mission” consisting of specific tasks tailored to the target. CIA operators can use a “CherryWeb” browser-based user interface to view Flytrap status and security information, plan new missions, view mission-related data, and perform system administration tasks.

SRI-SLO-FF-2012-177-CherryBlossom_UsersManual_CDRL-12_SLO-FF-2012-171
https://wikileaks.org/vault7/document/SRI-SLO-FF-2012-177-CherryBlossom_UsersManual_CDRL-12_SLO-FF-2012-171/]]></description>
		<content:encoded><![CDATA[<p>Dan Goodin / Ars Technica:<br />
WikiLeaks documents show how CIA infected WiFi routers from 10 manufacturers including D-Link and Linksys to monitor and manipulate traffic, infect more devices</p>
<p>Advanced CIA firmware has been infecting Wi-Fi routers for years<br />
Latest Vault7 release exposes network-spying operation CIA kept secret since 2007.<br />
<a href="https://arstechnica.com/security/2017/06/advanced-cia-firmware-turns-home-routers-into-covert-listening-posts/" rel="nofollow">https://arstechnica.com/security/2017/06/advanced-cia-firmware-turns-home-routers-into-covert-listening-posts/</a></p>
<p>Home routers from 10 manufacturers, including Linksys, DLink, and Belkin, can be turned into covert listening posts that allow the Central Intelligence Agency to monitor and manipulate incoming and outgoing traffic and infect connected devices. That’s according to secret documents posted Thursday by WikiLeaks.</p>
<p>CherryBlossom, as the implant is code-named, can be especially effective against targets using some D-Link-made DIR-130 and Linksys-manufactured WRT300N models because they can be remotely infected even when they use a strong administrative password. An exploit code-named Tomato can extract their passwords as long as a default feature known as universal plug and play remains on. Routers that are protected by a default or easily-guessed administrative password are, of course, trivial to infect. In all, documents say CherryBlossom runs on 25 router models, although it’s likely modifications would allow the implant to run on at least 100 more.</p>
<p>The 175-page CherryBlossom user guide describes a Linux-based operating system that can run on a broad range of routers. Once installed, CherryBlossom turns the device into a “FlyTrap” that beacons a CIA-controlled server known as a “CherryTree.” The beacon includes device status and security information that the CherryTree logs to a database. In response, the CherryTree sends the infected device a “Mission” consisting of specific tasks tailored to the target. CIA operators can use a “CherryWeb” browser-based user interface to view Flytrap status and security information, plan new missions, view mission-related data, and perform system administration tasks.</p>
<p>SRI-SLO-FF-2012-177-CherryBlossom_UsersManual_CDRL-12_SLO-FF-2012-171<br />
<a href="https://wikileaks.org/vault7/document/SRI-SLO-FF-2012-177-CherryBlossom_UsersManual_CDRL-12_SLO-FF-2012-171/" rel="nofollow">https://wikileaks.org/vault7/document/SRI-SLO-FF-2012-177-CherryBlossom_UsersManual_CDRL-12_SLO-FF-2012-171/</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
