Routers Contain Security Holes

Monday, April 22, 2013 @ 09:04 AM gHale


Thirteen popular home and small office routers contain security problems that could allow a hacker to snoop or modify network traffic, new research said.

All of the routers tested by Independent Security Evaluators (ISE), a security consultancy based in Baltimore, MD, could end up taken over if the hacker had access credentials. The tested products came from Linksys, Belkin, Netgear, Verizon and D-Link.

RELATED STORIES
Backdoor Found on Router
Moxa Mitigates Router Hole
Router Vulnerability Unveiled
Junos OS Open to Attacks

All of the router models evaluated ran their company’s latest firmware and ended up tested with their default, out-of-the-box configurations. Consumers have few options for mitigating the attacks, ISE said in its report.
http://securityevaluators.com/content/case-studies/routers/soho_router_hacks.jsp

“Successful mitigation often requires a level of sophistication and skill beyond that of the average user,” ISE said.

Compromised routers are valuable to hackers, since they can intercept the traffic of anyone on that network. If the traffic is unencrypted, the attacker can view it.

Man-in-the-middle attacks can let a hacker launch more sophisticated attacks on all users in the router’s domain, ISE said. Hackers can perform attacks such as sniffing and rerouting non-SSL (Secure Sockets Layer) traffic, tampering with DNS (Domain Name System) settings and conducting distributed denial-of-service attacks.

ISPs deploying large numbers of vulnerable routers could also give hackers a way into their own core infrastructure, ISE wrote.

ISE listed a few of the routers it studied, writing that it has notified vendors and worked in some cases on mitigations. It did not list product details for five of the routers, presumably because patches are not ready for release.

The consultancy divided the attacks into those which required an attacker to be on the same network and those on networks that could suffer a remote attack. Two routers from Belkin, the N300 and N900, were vulnerable to a remote attack that did not require the hacker to have authentication credentials.

All of the named products were vulnerable to an authenticated attack if the hacker was on the same network and had login credentials or access to a victim who had an active session on the particular network.

Those products were the Linksys WRT310v2, Netgear’s WNDR4700, TP-Link’s WR1043N, Verizon’s FiOS Actiontec MI424WR-GEN3I, D-Link’s DIR865L and Belkin’s N300, N900 and F5D8236-4 v2 models.



Leave a Reply

You must be logged in to post a comment.