50 Million Potentially Vulnerable To UPnP Flaws 138
Gunkerty Jeb writes "In a project that found more than 80 million unique IP addresses responding to Universal Plug and Play (UPnP) discovery requests, researchers at Rapid7 were shocked to find that somewhere between 40 and 50 million of those are vulnerable to at least one of three known attacks. A Rapid7 white paper enumerated UPnP-exposed systems connected to the Internet and identified the number of vulnerabilities present in common configurations. Researchers found that more than 6,900 product models produced by 1,500 different vendors contained at least one known vulnerability, with 23 million systems housing the same remote code execution flaw. 'This research was primarily focused on vulnerabilities in the SSDP processor across embedded devices,' Rapid7's CSO HD Moore said. 'The general process was to identify what was out there, make a list of the most commonly used software stacks, and then audit those stacks for vulnerabilities. The results were much worse than we anticipated, with the most commonly used software stack (libupnp) also being the most vulnerable.'"
Because of the BSD license (Score:1, Insightful)
Little incentive to contribute code as it will be snatched by Micro$oft and App£e.
Re: (Score:3)
Upstreaming your work can save you time (money) regardless of license. You can maintain your patch set independently indefinitely, but pushing your patch upstream makes it more likely that someone else will do it for you and perhaps do it better than you. Even if your patch is trivial, sometimes a small change can inspire more work.
I once submitted a patch fixing an obscure overflow. It was a simple off-by-one flaw. Someone else scratched their head and decided to check the software for more code defec
Re: (Score:2)
Does anyone know where I can find a list of routers which aren't vulnerable?
Re: (Score:2)
Does anyone know where I can find a list of routers which aren't vulnerable?
Have you tried scanning the Internet?
Re:UPnP is a vulnerability (Score:5, Informative)
Almost all routers are not vulnerable, if you are smart enough to uncheck the UPnP box. I haven't seen many where you can't disable it. and as has been pointed out elsewhere. Running a firewall where any malware can request a gapping hole in it sort of defeats the purpose.
These flaws are already a non-issue to anyone who takes security seriously. The problem is that the average user leaves things as they come from the factory, and they come from the factory vulnerable.
Re: (Score:2)
What about those of us who want to use UPnP and so can't trivially uncheck the box?
Re: (Score:3)
Then sleep well knowing that your insistence on continuing to use a known insecure feature just for a little bit of extra convenience might just come back to bite you in the ass eventually. The rest of us who know the flaws of UPnP and how to manually set up port forwarding and/or port triggering have likely already done this long ago; we survived, our networks aren't broken. It's really not difficult; just a couple switches on the router to match the ports of the software you use.
Re: (Score:2)
Re: (Score:2)
Translation: "how can I enable a security vulnerability while disabling a security vulnerability?"
The sentence just doesn't parse that way does it?
There is no secure way to let any piece of software that wants to open your firewall do so. The whole concept of a firewall is disabled by the idea of UPnP.
If you need a port opened, then open the port. Letting random software do it automatically is just asking for trouble.
Re: (Score:2)
Appropriate reply based on user name. I see what you did there.
Re: (Score:2)
This!
uPnP is a solution to a non-problem. Whats the point of any firewall if an application can request a hole through it?
There is the capabilities of having ACLs but the majority of routers it is just a tick-box to enable/disable, allowing any device internally to have free reign to accept incoming requests.
Re: (Score:3)
Re: (Score:2)
My understanding was that UPnP was for punching a hole in the firewall/NAT for incoming requests.Joe Average doesn't need this functionality does he?
Outgoing NAT on consumer grade routers is a separate feature from UPnP and isn't required to use your laptop/TV/tablet/phone on the internet.
I think UPnP at the most (ni the average house) is used by the Playstation to host or any other server-less P2P network for connectivity. Solve that problem, and we're gold.
Re: (Score:1)
NAT is not an argument for security, don't combine it with a firewall like that. uPnP was a workaround to the NAT problem that was a workaround to the single public IP most ISP's provided to their customers. I remember I had to coax my ISP to give me more IPs so I could play Starcraft 1 online with my friends against other players. Great fun, and I got to play around with a Juniper traffic shaper and IP assignment.
If you want to run a server or host anything, having support for uPnP is great - you don't hav
Re: (Score:2)
>My understanding was that UPnP was for punching a hole in the firewall/NAT for incoming requests
No, uPnP is primarily about AV devices finding each other so they can do stuff like sending video from the video source to the TV. It's network detection and selection, device discovery, service discovery and service negotiation. All run of the mill consumer electronic behaviors that the industry has managed to massively screw up for the past 30 years. P1394 tried and screwed it up (discovery and negotiation)
Re: (Score:2)
Okay thats great thanks.
My experience of UPnP has been from routers and firewalls. For example the linux daemon for upnp upnp just adds a NAT rule in the UPNP table.
The pfSense option does the same thing.
The article is about upnp from many IPs (via routers I would of imagined)
Re: (Score:2)
Yes. Millions of vulnerable uPnP implementations in consumer electronics, behind cheap NAT routers that by default allow a uPnP hole.
Re: (Score:2)
You see your average Joe has all these devices that can connect to the Internet, multiple PCs, tablet, phone, Internet enabled TV, but they don't have a damned clue on how to make ANY of that shit play nice with one another or to set it up so they can use them on the net as they were designed.
So Microsoft, instead of handing the user a rag and a bottle of Windex (or water diluted vinegar which works just as well) to clean their dirty [Ww]indows so they can see out, instead handed them a hammer so they can break the glass.
Amazing. UPnP has been a disastrous idea from day one. It surprises me every time I hear of someone who's ignorant of this.
Re: (Score:2)
Nooo...its a solution to a VERY real problem but its a problem that most geeks don't realize exists. You see your average Joe has all these devices that can connect to the Internet, multiple PCs, tablet, phone, Internet enabled TV, but they don't have a damned clue on how to make ANY of that shit play nice with one another or to set it up so they can use them on the net as they were designed.
Well, it's about time they fucking learn. Computers don't need to be dumbed down to toaster levels... their increasing number of users need to learn a thing or two about a network of they want to have one in the first place. This mass retardation of computers has allowed even the dumbest people to do basic things on them, and that's great--but if these people want to do anything more advanced, then maybe it's time that they read up and learn how. This mass dumbing down of computing and networking is crea
Re: (Score:2)
Re: (Score:2)
Why do braindead apps/games need open ports (Score:2)
Why?!? UPNP should only be necessary for running servers. If you want to host a game server or ftp server or web server, port-forward the appropriate port(s) on your NATing router. Hopefully, you have some basic understanding of the security implications.
What I don't understand is how UPNP got accepted as a protocol. Why are some apps so braindead that clients need UPNP? TFA mentions "smart TVs, IP cameras, printers, media servers and routers to name a few". An ordinary PC can subscribe to Netflix without U
Re: (Score:2)
Is it ``hacking'', the way they discovered it? (Score:5, Interesting)
or did they actually do active spidering of (b):
.
If they did (a) above, then sure it makes sense. If they did (b1) or (b2) above, especially if they didn't get the permission of every IP address which they probed/tested, then aren't they doing illegal penetration testing, even if all they are doing is checking for the existence of a responding port? I mean one or two or an accidental port knock would be like knocking IRL on a random stranger's door, but a sequential serialized intentional attempt to knock on so many doors to test vulnerability, well that's just annoying and wrong, and possibly illegal,eh?
Re:Is it ``hacking'', the way they discovered it? (Score:5, Informative)
Their methodology is explained in the report. Halfway through the first page of executive summary you'll find the following:
Re: (Score:3)
Re: (Score:2)
It's good to know that the slashdottir are looking out for us.
Re: (Score:1)
If your last name is Slashdottir, that probably means that you're a girl whose Icelandic mom got to "hang out" backstage at a Guns n Roses concert a few years back.
Re: (Score:2)
If they did (b1) or (b2) above, especially if they didn't get the permission of every IP address which they probed/tested, then aren't they doing illegal penetration testing, even if all they are doing is checking for the existence of a responding port?
Would it be illegal though? For example how would it be illegal to scan port 80 on every public IP address?
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
"Feels wronger" doesn't mean it's actually illegal tho
Re: (Score:2)
You are kidding right? Also, a better but still imperfect analogy would be that they are walking down streets observing i
Re: (Score:2)
.
Halfway through the first page of executive summary you'll find the following:
June 1 to November 17, 2012.
I didn't notice that detail the first time I read the article.
Re: (Score:1)
identity theft : another route for prosecution? (Score:2)
Long standing bet (Score:5, Insightful)
The closest that I have seen to a good widespread attack was when a certain DSL modem would crash when script-kiddies were attacking NT machines and the same attack jammed up that model DSL modem. That wasn't really an attack and it didn't amount to much.
So my bet still stands with modification: there will be an attack, it will be soon, it will be a worm, and people will (mostly) be blissfully unaware of (why is my internet so slow) it and certainly be incapable of dealing with it. Thus it will come down to the ISPs to deal with it which should be interesting to watch.
Re: (Score:3, Insightful)
Router software is utter, total, complete shit and all of it is attackable with 25-year-old buffer overflows.
GP is right. A worm packing a handful of attacks, designed to replicate on old routers, would make hundreds of millions of victims and nothing could stop it.
It would actually force the rock-stupid morons to replace their obsolete hardware, though. That would be a good thing. Even if they buy the new castrated shit hardware that won't ever be supported.
Attack surface is still smaller (Score:2)
Remote buffer overflow in what? the Linux Kernel? IPTables?
There are some crappy routers which expose remote administration tools by default, but those are the exception. Most old home routers only flaw is to enable Universal PnP out of box and not to encrypt wireless.
Re: (Score:2)
Actually I doubt a technical attack is necessary to hinder the security considering how many people just keep the default passwords for their routers.
Re: (Score:2)
No home router I've ever seen has allowed login on the Internet exposed interface.
Wifi yes though. Very much yes, and very vulnerable.
Re: (Score:2)
"No home router I've ever seen has allowed login on the Internet exposed interface. "
By default I mean.
Re: (Score:2)
Yes, good point, that would only be useful for attacks that come from the users computer.
Re: (Score:2)
If we're lucky, it'll force the rock stupid ISP's to roll out IPv6 world wide. That would fix the god damn problem the fastest and solve the problem if address exhaustion we're already facing. Get all of us home users off IPv4 and onto IPv6 with the damn modems actually supporting multiple IPv6 addresses.
How does that address the problem? (Score:2)
> If we're lucky, it'll force the rock stupid ISP's to roll out IPv6 world wide. That
> would fix the god damn problem the fastest and solve the problem if address
> exhaustion we're already facing. Get all of us home users off IPv4 and onto
> IPv6 with the damn modems actually supporting multiple IPv6 addresses.
How does that address the problem? What makes you think that brand new barely-tested IPV6 firmware would be any more secure than older patched IPV4 firmware?
Re: (Score:1)
They have other bugs, still buffer overflows. Basically, all models that don't have sanitation on all inputs can be hacked that way. And there are zero consumer routers that sanitize everything. But there are a lot of consumer routers that can very simply be 0wned and stay 0wned.
Still wondering why anyone ever bothered making botnets out of Windows boxes. It's so much easier to keep routers infected than PCs.
Re: (Score:1)
Still wondering why anyone ever bothered making botnets out of Windows boxes. It's so much easier to keep routers infected than PCs.
Try to put something on a device that is underpowered for the job it is designed for. Many DSL routers break CPU and/or memory wise if you really use your connection.
Re: (Score:3)
Interesting thought, which has probably occurred to other people, of course.
I suppose the reason why we have not seen large-scale attacks on routers so far, (and maybe there are some out there already, undetected) is that it has just been easier to infect PCs and use them in botnets, with the tools widely available.
Would probably take a little more time and ingenuity to setup a net of zombie routers, with the need to tailor the worm or whatever a little to each model/software stack.
However, once it was in p
Re: (Score:2)
It is simple processing power.
you hack a router the victims internet slows down. Whether your using bandwidth or not. They notice it, eventually call the ISP. The ISP makes you plug a real computer in and suddenly everything is moving fast again.
You go to best buy plunk down some cash get another router. The old one goes in the garbage.
no more bot node.
Re: (Score:1)
Re: (Score:2)
I used to have a PC which was a router. But now I have a router which is a computer.
I will probably go back to Wireless-G, and then I'll be able to use tomato again. But at least my current router is Linux-based. For some reason there's no alternate distributions for it, probably mostly because the GPL sources/build environment don't actually work. Thanks, D-Link.
Re: (Score:2)
The way you describe it'll be hard to call your bet. How can one disprove this hasn't already happened?
Re: (Score:2)
Traditionally the light weight home routers vulnerable or not have just not been targets. It was easy enough to get control of the much more powerful machine behind it. If you wanted a spam bot a PC is much more useful. If you are an identity theif etc, the PC will have information on it, the route probably not so much. If you are script kiddy and you just want metasploit to grab some screen shots for the lolz then again the PC behind the router was more interesting.
I am not saying that in an attack con
Re: (Score:2)
Easy - routers are not monocultures. They vary in price and capabilities from sub-$20 specials to $200+ with fast processors
I saw this coming 5 years ago (Score:1)
Let any application open a port to the outside world on your router? Really? and nobody gave a damn about the consequences or even understood its power. Meanwhile I sat back and watched as millions of people enabled it by default on products shipped out worldwide and said nothing because NOBODY CARED they /wanted/ the convenience and turn-key solution that UPnP provided and didn't want to bother learning how to open their own ports manually.
Re: (Score:3)
Steve Gibson of grc.com had been warning about plug'n play since late 2001 when windows XP was on it's first release. He even offered a service to quickly turn it off and scan for it.
Of course that was back when MS claimed their software firewall on XP was enough to put your computer directly onto the internet and you could use the XP machine as a router with internet connection sharing actually working easily on it. And if doing so, the average time from fresh install to infected was about 5 minutes or so-
Re: (Score:2)
Anyways, the alarms have been going up for about 12 years now. I wasn't aware that routers were implementing it until recently so I'm sure I'm in the problem pile on this.
Not sure if it was exposed in lowend firmwares, but we were turning it off in ddwrt back in '04 (maybe it was still ewrt at that point).
Re: (Score:3)
Does anyone know if the latest DD-WRT, OpenWRT, and Tomato releases are vulnerable?
Re: (Score:1)
Gosh, BOTH informative and a troll. Hey people, it makes it hard to moderate if you don't put your differing characteristics in separate posts.
Suddenly old UPnP problem is hot - Media Servers? (Score:1)
I did actually install that Gibson thing to disable my UPnP in 2001 because I didn't see a use for accessing my Plug-and-Play hardware over the net - the very concept of plugging something into one machine and accessing it from another as if it had been plugged in there felt far too much like a security problem to me.
Seems these days this is just becoming a hot topic again because Media Servers seem to use UPnP for streaming music and movies to your TV, or speakers, or smartphone, or tablet - yes, right acr
V1.0? (Score:2)
How many vendors are going to patch some obsolete hw to get the lib updated? I would be surprised if they can build images for some of those old products. That said, it seems a bit of an uphill crack, you have to know the target CPU, the lib version, and prepare a useful injection rather than just a denial of service. Still, it is interesting that people are still acting as documented on data coming over the wire, sprintfs into buffers with %s was an eye opener to me. These days for web stuff I use the c++
Re: (Score:1)
How many vendors are going to patch some obsolete hw to get the lib updated?
Zero.
I would be surprised if they can build images for some of those old products.
I'm certain that most of them have simply lost or let bitrot the toolchains they need to build those images.
That said, it seems a bit of an uphill crack, you have to know the target CPU, the lib version, and prepare a useful injection rather than just a denial of service.
Pack several exploits in the worm.
Still, it is interesting that people are still acting as documented on data coming over the wire, sprintfs into buffers with %s was an eye opener to me. These days for web stuff I use the c++ string class, fixed c buffers look weak to me with unvalidated socket input.
H.
Shovelware kit will always be programmed all wrong and never be updated, be it by their rock-fuck owners or greedy makers.
Re: (Score:1)
And you've just given me one more reason to think that my policy of "turn it off" (since it was first put into a consumer OS) was correct.
"All we want to do is tell the fucking router that we'd like an open port. Why should that be so difficult?"
Because it's MY DAMN COMPUTER and network, that's why. And you have no need to open my ports. You can talk outwards, no problem at all, to any destination that will accept a connection. And most home routers will NOT accept a connection (you have to think of peop
Re: (Score:2)
find the posts (Score:4, Interesting)
Just yesterday, lots of Slashdot readers claimed UPnP was totally reasonable for security. It's time for a wall of shame. Here is the story:
http://it.slashdot.org/story/13/01/29/0111238/58000-security-camera-systems-critically-vulnerable-to-attackers [slashdot.org]
I'll start.
adolf: http://it.slashdot.org/comments.pl?sid=3415287&cid=42722879 [slashdot.org]
Miamicanes: http://it.slashdot.org/comments.pl?sid=3415287&cid=42723217 [slashdot.org]
julesh: http://it.slashdot.org/comments.pl?sid=3415287&cid=42723393 [slashdot.org]
Re: (Score:1)
Maybe you should start with the link to your comment where you claimed it was not (and specifically because of bad implementation, instead of just being an unauthenticated protocol). Otherwise you don't have the told-you-so right, and your comment is nothing but a flamebait.
Re: (Score:2)
And... They are still right. Particularly adolf's analysis is pretty much spot on. I didn't bother to read the rest.
If you are scared that you might get some malware on a device located behind your router, you've already lost the game. The malware could have already grabbed all your important stuff and posted it to an overseas website. Do you also have key locks on the INSIDE of the doors that lead out of your house? I mean what if a burglar snuck into your house somehow, now they would be able to unloc
Brilliant by design (Score:1)
Rapid7 provide a testing tool. It requires Java. So to find one vulnerability, you have to install another.
Re: (Score:3, Insightful)
Rapid7 provide a testing tool. It requires Java. So to find one vulnerability, you have to install another.
So don't install the Java plugin in your browser and quit bullshitting.
Re: (Score:2)
Aren't "native" Java applications given way more permissions than the browser plugin?
So isn't that a worse vulnerability?
native apps have native permissions, SO WTF MAN?
FYI If you have Verizon FiOS... (Score:5, Informative)
...Like I do, you may find the router's UPnP page mysteriously missing from the "Advanced" section of your admin panel. This is a brilliant move on their part to avoid users breaking their skype/game access and then calling tech support.
But the page itself is still there. Only the link was removed. To get to it, visit : http://192.168.1.1/index.cgi?active%5fpage=900 [192.168.1.1]
Suck it, Verizon!
Re: (Score:2)
Re:FYI If you have Verizon FiOS... (Score:5, Funny)
...Like I do, you may find the router's UPnP page mysteriously missing from the "Advanced" section of your admin panel. This is a brilliant move on their part to avoid users breaking their skype/game access and then calling tech support.
But the page itself is still there. Only the link was removed. To get to it, visit : http://192.168.1.1/index.cgi?active%5fpage=900 [192.168.1.1]
Suck it, Verizon!
Forgot to add, my router model is MI424WR-GEN3I
Hey I just tried to login to your browser, but it seems to be a Linksys Router, and that link didn't work, got a 404 back. So please - for the next time - make sure what your talking about!
Re: (Score:2)
Re: (Score:2)
Whooshy-whoosh! I've always wanted to do that :-D
Bridge your FIOS modem... apk (Score:1)
Set it into "bridged" mode, & get a GOOD NAT stateful packet inspecting router!
(E.G./I.E.-> For example, my LinkSys/CISCO BEFSX41 for example, can do this - most, CAN!).
Why?
It works, since it sets THEIR FIOS (or DSL) modem into "dummy terminal mode", & then allows YOUR router to take overcontrol duties instead!
(Which, odds are, since your firewalling router has more features for security, odds are, including UPnP control, "hardware-side" - then, you can also do this OS-side too, in Windows as wel
Re: (Score:2)
Re: (Score:2)
You don't notice it on skype much, but in the case that both the sender and receiver are both behind non-UPnP NAT routers, then your entire conversation gets sent to a node somewhere on the network. That node could be Mr Joe badguy who likes to listen in to people's skype calls (Not hard to do). I know sending files didn't used to work at all, but they might have fixed that in the past couple of years, I really didn't keep up on the changes skype made. In any case, not only does it send packets to a 3rd
Lol shovelware (Score:2)
Yes, shovelware applies to hardware too. Hardware like home routers, which are NEVER EVER updated - be it by their rock-dumb owners or their irresponsible manufacturers.
And then this happens. All the time forever, until the greedy fucks who make those never-updated shit get slapped with fines for gazillions, and THEN the surviving ones would begin to think of SUPPORTING the crap they sell, instead of shoveling poorly-differentiated models that only exist to make the non-castrated one more expensive than it
2001 just called.... (Score:1)
We were warned (Score:1)
Microsoft was one of the founders of the UPnP Forum, Apple isn't a member. Not to mention that Microsoft pushed this API very hard. We were warned of the vulnerability of this protocol back in 2001. There was a big deal with Windows ME and XP about disabling this service also, It was Microsoft whom ignored all the vulnerabilities at first, if they scared OEMs then the OEMs wouldn't implement this protocol.
This is yet another example of why Microsoft has too much power and shouldn't be dictating what's in my
Level7 is a Phishing vulnerability (Score:2)
I followed the link to the article... then the link to the PDF follow the link to their "Vulnerablity Detector"... Start to install... Read the Legalese... The terms are suspicious... Click OK tpo continue... The next screen asks for personal information. Red Lights and Alarms go off. Anytime a "security vendor" lists contract terms like those and then wants my name and address when I did not want or ask to contract a service. I killed the installer.
Level7 is not preventing a problem --- it is the problem.
Me not understand (Score:2)
Re: (Score:2)
Tomato Firmware v1.28 not vulnerable (Score:2)
I've got an old Linksys WRT54GL running the latest Tomato Firmware (v1.28; development seems to have stopped), which has MiniUPNP v1.4 providing Universal PnP services. Version 1.4 is not vulnerable to the exploits listed in the whitepaper (1.0 is), so it's probably safe to keep it turned on.
Re: (Score:2)
Router/NAT for Security? (Score:2)
You fool! Anyone who depends on their router for security is an idiot. You assumed that your brand new laptop would be safe when connecting to your home LAN, behind that router? What were you planning on doing when you took it to Starbucks and used their WiFi?
Security need to be built into each device in the form of a software firewall. Unneeded ports need to be closed, whether you are on a LAN or not. Once this is taken care of, you can assume that your home/office LAN is as hostile as the Internet at lar
Re: (Score:2)
Nope. I don't do Windows. But this is something the Microsoft crowd should have been working on. Instead of the Metro UI.
GRC (Score:1)
Upnp was spotted as an issue years ago by Gibson research Corp more than 10 years ago. He even made tools to test for it. www.grc.com