View Full Version : Home routers under attack...
How to Protect Your Wi-Fi Network from the WPA Hack
Nov 7 2008 - "... a PhD candidate studying encryption has found an exploit in the WPA standard that would allow a hacker to "send bogus data to an unsuspecting WiFi client," completely compromising your Wi-Fi security and opening your network to all sorts of hacking. Lucky for you, it's not terribly difficult to protect yourself against the new exploit.
The key: Just log into your router, switch off Temporal Key Integrity Protocol (TKIP) as an encryption mode, and use Advanced Encryption System (AES) only. TKIP is the only protocol that the hack applies to, so switching to AES-only will ensure that your Wi-Fi network is safe again. It's quick and easy, so do yourself a favor and make the adjustment now so you don't run into any problems in the future."
Last revised: 12/03/2008
"... the use of WPA2 with AES is recommended whenever possible..."
DSL modem-router botnet...
Mar. 1, 2010 - "... Dubbed the “Chuck Norris botnet,” based on the Italian comment in its source code, in nome di Chuck Norris (translation: “in the name of Chuck Norris”), this botnet infects vulnerable DSL modems and routers to spread a worm Trend Micro detects as WORM_IRCBOT.ABJ. This worm tries to gain access to a target router by guessing the router’s configuration password using brute force. It may also spread via shared networks by exploiting a known Microsoft vulnerability, MS03-039 Buffer Overrun in RPCSS Service. The worm’s routines make users who are connected to the same network or router at risk of being infected. This worm also has backdoor capabilities that allows attackers to execute remote command on affected systems, which include downloading and executing other malware and launching denial-of-service (DOS) attacks against other systems. Ultimately, its main goal is still to gain profit from unknowing users by stealing personally identifiable information (PII) and credentials to access certain websites, particularly online banking sites. Its infection routine via router may be unusual for most bots of its kind, which usually infects computers. But it is not the first time that bots have used modems and routers as a propagation platform. Trend Micro has, in fact, reported such attacks in the past in relation to other threat families such as ZLOB, RBOT, and QHOST..."
Wi-Fi hacked in seconds ...
14 Oct 2010 - "... Using only a laptop and widely available software, our ethical hacker demonstrated how vulnerable we are to Wi-jacking because of non-existent or inadequate online security. Having gained access to your personal details hackers can ‘cloak’ criminal activities such as purchasing illegal pornography or selling on stolen goods. It also allows them to view your private transactions over the network, accessing passwords and usernames which can then be used to impersonate you and commit identity fraud and other illegal activity in your name.
Key findings from the report:
• We found that nearly a quarter of private wireless networks have no password whatsoever attached, making them immediately accessible to criminals
• Hackers were able to ‘harvest’ usernames and passwords from unsuspecting people using public networks at a rate of more than 350 an hour, sitting in town-centre coffee shops and restaurants.
• More than 200 people unsuspectingly logged onto a fake Wi-Fi network over the course of an hour, putting themselves at risk from fraudsters who could harvest their personal and financial information.
Steps and ways to protect yourself..."
(More detail at the URL above.)
November 1, 2010 - "Chances are you don't leave your front door unlocked. And you shouldn't leave your Wi-Fi network unsecured either. Many of you may have heard this before, but many still seem to not be doing anything about it. You should. Here's why. With a $50 wireless antenna and the right software a criminal hacker located outside your building as far as a mile away can capture passwords, e-mail messages, and any other data being transmitted over your network, and even decrypt data that is supposedly protected..."
Tools bypass Wireless router security...
December 29, 2011 - "... At issue is a technology called “Wi-Fi Protected Setup” (WPS) that ships with many routers marketed to consumers and small businesses... Setting up a home wireless network to use encryption traditionally involved navigating a confusing array of Web-based menus, selecting from a jumble of geeky-sounding and ill-explained encryption options (WEP, WPA, WPA2, TKIP, AES), and then repeating many of those procedures on the various wireless devices the user wants to connect to the network. To make matters worse, many wireless routers come with little or no instructions on how to set up encryption. Enter WPS. Wireless routers with WPS built-in ship with a personal identification number (PIN – usually 8 digits) printed on them. Using WPS, the user can enable strong encryption for the wireless network simply by pushing a button on the router and then entering the PIN in a network setup wizard designed to interact with the router. But according to new research, routers with WPS are vulnerable to a very basic hacking technique: The brute-force attack. Put simply, an attacker can simply try thousands of combinations in rapid succession until he happens on the correct 8-digit PIN that allows authentication to the device... if your router has a “WPS PIN” notation on its backside, then it shipped with this WPS feature built-in."
Last Updated: 2011-12-27 - "... Workarounds: Disable WPS... best practices also recommend only using WPA2 encryption with a strong password, disabling UPnP, and enabling MAC address filtering so only trusted computers and devices can connect to the wireless network."
Last Updated: 2011-12-30 03:19:11 UTC - "... Disable WPS..."
• Linksys WPA2 setup: http://www6.nohold.net/Cisco2/GetArticle.aspx?docid=cfb50c0dc992443ab2405a782cca60f7_19073.xml&pid=80&converted=0#WPA2
• D-Link WPA2 setup: http://support.dlink.com/faq/view.asp?prod_id=1506
• Netgear WPA2 setup: http://kb.netgear.com/app/answers/detail/a_id/112
• Belkin WPA2 setup: http://en-us-support.belkin.com/app/answers/detail/a_id/33/kw/wpa2%20setup/session/L3RpbWUvMTMyNTIwNTQyNS9zaWQvM01qSjhSTWs%3D
WPS vulnerable to Brute-Force Attack
January 06, 2012 - "... Solution: Update Firmware: Check your access point vendor's support website for updated firmware that addresses this vulnerability. Further information -may- be available in the Vendor Information section of VU#723755* and in a Google spreadsheet called WPS Vulnerability Testing**.
Disable WPS: Depending on the access point, it may be possible to disable WPS. Note that some access points may -not- actually disable WPS when the web management interface indicates that WPS is disabled..."
Cisco WPS vuln Response
2012-January-18 - Rev 2.0 - Updated information for the WRP400.
Cisco WPS vuln - status updated ...
2012-January-27 - Revision 3.0... Updated the Cisco UC320W WPS Disable status to Yes due to release of DisableWPS.pmf**. Added Cable and DSL access products currently under investigation. Added a link to Linksys product documentation*...
WPS vulnerability status update for Linksys devices
"... Cisco will be releasing firmware that allows customers to disable Wi-Fi Protected Setup to eliminate exposure to this issue... table lists affected products and will be updated with dates and firmware version numbers that include the ability to disable WPS..."
Last Modified: Jan 26, 2012 - Rev. 10
Last Updated: 2012-01-28
WPS PIN brute force vulnerability
Last revised: 10 May 2012
Overview: The WiFi Protected Setup (WPS) PIN is susceptible to a brute force attack. A design flaw that exists in the WPS specification for the PIN authentication significantly reduces the time required to brute force the entire PIN because it allows an attacker to know when the first half of the 8 digit PIN is correct. The lack of a proper lock out policy after a certain number of failed attempts to guess the PIN on many wireless routers makes this brute force attack that much more feasible...
Impact: An attacker within range of the wireless access point may be able to brute force the WPS PIN and retrieve the password for the wireless network, change the configuration of the access point, or cause a denial of service...
Please consider the following workarounds:
> Disable WPS
Within the wireless router's configuration menu, disable the external registrar feature of WiFi Protected Setup (WPS). Depending on the vendor, this may be labeled as external registrar, router PIN, or WiFi Protected Setup...
DSL modem hack used to infect millions - banking fraud malware
Oct 1, 2012 - "Millions of Internet users in Brazil have fallen victim to a sustained attack that exploited vulnerabilities in DSL modems, forcing people visiting sites such as Google or Facebook to reach imposter sites that installed malicious software and stole online banking credentials... The attack... infected more than 4.5 million DSL modems, said Kaspersky Lab Expert Fabio Assolini, citing statistics provided by Brazil's Computer Emergency Response Team. The CSRF (cross-site request forgery) vulnerability allowed attackers to use a simple script to steal passwords required to remotely log into and control the devices. The attackers then configured the modems to use malicious domain name system servers that caused users trying to visit popular websites to instead connect to booby-trapped imposter sites. "This is the description of an attack happening in Brazil since 2011 using 1 firmware vulnerability, 2 malicious scripts and 40 malicious DNS servers, which affected 6 hardware manufacturers, resulting in millions of Brazilian internet users falling victim to a sustained and silent mass attack on DSL modems," Assolini wrote... "This enabled the attack to reach network devices belonging to millions of individual and business users, spreading malware and engineering malicious redirects over the course of several months"... The vulnerability is even more alarming since the list of affected manufacturers and models is still unknown. Users who want to protect themselves should make sure their modems are using the latest available firmware, although based on what we know now, there's no guarantee the latest release has been patched against the exploited CSRF flaw."
Linksys WRT54GL firmware vuln
Release Date: 2013-01-21
Impact: Cross Site Scripting
Where: From remote
Solution Status: Vendor Patch
Operating System: Linksys WRT54GL 4.x
Solution: Update to firmware version 4.30.16.
Original Advisory: Linksys:
D-Link DIR-300 / 600 routers vuln
Feb 7, 2013 - "... vulnerabilities in D-Link’s DIR-300 and DIR-600 routers could allow an attacker to inject arbitrary shell commands and ultimately compromise the device... Messner first discovered the vulnerabilities at the tail end of 2012 and forwarded them to D-Link who insisted the issue was relegated to browsers and that the company would not publish a fix. Messner elected to provide more information to D-Link more than a week and a half ago, on January 25. Having still not heard back yet, Messner saw fit to publicly releasing the attack details earlier this week. A post by The H-Security* claims that all current D-Link firmware versions (Version 2.13, released November 7, 2012 and Version 2.14b01, released January 22, 2013) are affected by the flaw and suggests – at least until D-Link issues a fix – to “decommission the affected browsers.” D-Link did not respond to e-mail requests for comment..."
6 Feb 2013
Feb 07, 2013
Analysis: "Many home offices and small offices use broadband connections with devices like the D-Link routers. Such environments don't often have security savvy people on staff, and the compromise of such devices can lead to all sorts of issues such as attackers planting malicious DNS servers in the device configuration that affect every system on the LAN using DHCP to receive DNS settings. In addition, an attacker could use such a vulnerability to penetrate deeper into an enterprise network by compromising a machine on the LAN and backdooring it."
8 Feb 2013
Release Date: 2013-02-08
Criticality level: Moderately critical
Impact: Exposure of system information, System access
Where: From local network
... weakness, security issues, and vulnerability are reported in the following products:
* D-Link DIR-300 version 2.12 and 2.13.
* D-Link DIR-600 version 2.12b02, 2.13b01, and 2.14b01.
Solution: No official solution is currently available.
D-Link DIR-645 - Firmware v1.03 update-fix
Release Date: 2013-03-01
... security issue is reported in version to 1.02. Other versions may also be affected.
Solution: Reportedly fixed in version 1.03.
Original Advisory: http://archives.neohapsis.com/archives/bugtraq/2013-02/0151.html
"... D-Link has released an updated firmware version (1.03) that addresses this issue..."
Latest Firmware - Version v1.03
Linksys EA2700 firmware - update
Apr 9, 2013 - "... The most severe of the vulnerabilities in the "classic firmware" for the Linksys EA2700 Network Manager is a cross-site request forgery weakness in the browser-based administration panel... A statement issued by officials from Belkin, which recently acquired the Linksys brand, said the vulnerabilities documented by Purviance had been fixed in the Linksys Smart Wi-Fi Firmware that was released in June... link for the Linksys Smart Wi-Fi Firmware:
EA Series Linksys Smart Wi-Fi Firmware