x404.co.uk
http://www.x404.co.uk/forum/

Homeland Security: Disable UPnP, as tens of millions at risk
http://www.x404.co.uk/forum/viewtopic.php?f=19&t=18197
Page 1 of 1

Author:  ProfessorF [ Tue Jan 29, 2013 10:32 pm ]
Post subject:  Homeland Security: Disable UPnP, as tens of millions at risk

Quote:
Homeland Security: Disable UPnP, as tens of millions at risk
Summary: The U.S. government is warning to disable a common networking feature after bugs have left tens of millions of hardware devices vulnerable to attacks by hackers and malware.


By Zack Whittaker for Zero Day | January 29, 2013 -- 21:03 GMT

The U.S. Department of Homeland Security is next in line to warn of a serious threat to networking devices, such as scanners and printers, computers and routers.
It comes only a few hours after a white paper was released by security researchers at Rapid7, which claimed that approximately 40 to 50 million devices worldwide are vulnerable to infiltration by hackers as a result of a flaw in a networking protocol.
UPnP, or Universal Plug and Play, allows devices that connect to networks, to communicate seamlessly with one another and discover each other's presence. Devices can then connect over a network to share files, print documents, and access other shared resources.
But now Homeland Security is concerned that the vulnerability could impact millions of machines, and warns users to update their software or disable UPnP altogether.

The trouble is for many, operating system makers—such as Apple and Microsoft—must create hotfixes or patches. The researchers already noted that over 1,500 vendors and 6,900 products identified were vulnerable to at least one of the flaws, including from vendors such as Belkin, D-Link, Linksys, and Netgear.
"Multiple vulnerabilities have been announced in libupnp, the open source portable SDK for UPnP devices. Libupnp is employed by hundreds of vendors for UPnP-enabled devices," the U.S. Computer Emergency Readiness Team (US-CERT) said in a note published today.
"US-CERT recommends that affected UPnP device vendors and developers obtain and employ libupnp version 1.6.18, which addresses these vulnerabilities."

It is understood from Rapid7's findings that there are numerous bugs with the protocol, which could ultimately put at risk tens of millions of networked devices—especially those connected directly to the Internet.
It then warns to "disable UPnP (if possible)," along with restricting networking protocols and ports, including Simple Service Discovery Protocol (SSDP) and Simple Object Access Protocol (SOPA) services from untrusted networks, including the Internet.
The risk is that hackers could "execute arbitrary code on the device or cause a denial of service," or in other words: install malware on your computer and/or run it as part of a botnet.
Along with this, hackers could access confidential documents, steal usernames and passwords, take over PCs, and remotely access networked devices, such as webcams, printers, televisions, security systems, and other devices plugged in or wireless connected to networks.
Most networking devices in fact use UPnP, including computers running Windows, Apple's OS X, and Linux. Many mobile devices also use UPnP to print to wireless or networked printers.

It's rare for the U.S. government to actively warn to disable software or a feature. That said, it comes only a fortnight after Homeland Security actively warned users to disable Java software, after a serious vulnerability was found that could have allowed hackers or malware writers to remotely execute code, if a rigged Web site was visited.


http://www.zdnet.com/homeland-security-disable-upnp-as-tens-of-millions-at-risk-7000010512/

Author:  Amnesia10 [ Tue Jan 29, 2013 10:55 pm ]
Post subject:  Re: Homeland Security: Disable UPnP, as tens of millions at risk

As a mac user Java is not installed on Lion and Mountain Lion OSes. So that is one threat dealt with, but this other threat seems a lot more complex for the average user to deal with. What they needed to do was have a website where you entered your device and it would tell you if you were at risk.

Author:  l3v1ck [ Tue Jan 29, 2013 11:12 pm ]
Post subject:  Re: Homeland Security: Disable UPnP, as tens of millions at risk

Gibson research has had a thing about UPnP on it's site for years

Author:  big_D [ Wed Jan 30, 2013 5:12 am ]
Post subject:  Re: Homeland Security: Disable UPnP, as tens of millions at risk

Yep, I listen to Gibson's Security Now podcast ( http://twit.tv/sn ) and he ranted about this ages ago!

One of the first thing I did with my new router was ensure that UPnP is disabled. Internal network was enabled for Fritz!Box apps for Windows, iOS and Android, external UPnP was disabled.

Author:  Amnesia10 [ Wed Jan 30, 2013 5:55 am ]
Post subject:  Re: Homeland Security: Disable UPnP, as tens of millions at risk

l3v1ck wrote:
Gibson research has had a thing about UPnP on it's site for years

I went to the Gibson site to do a Shields Up test and with the exception of the ping test it passed. Does anyone know how I can stop my machine responding to Pings?

Author:  saspro [ Wed Jan 30, 2013 8:53 am ]
Post subject:  Re: Homeland Security: Disable UPnP, as tens of millions at risk

Amnesia10 wrote:
l3v1ck wrote:
Gibson research has had a thing about UPnP on it's site for years

I went to the Gibson site to do a Shields Up test and with the exception of the ping test it passed. Does anyone know how I can stop my machine responding to Pings?


You need to set that on your router if you're testing your external address

Author:  paulzolo [ Wed Jan 30, 2013 9:39 am ]
Post subject:  Re: Homeland Security: Disable UPnP, as tens of millions at risk

Amnesia10 wrote:
As a mac user Java is not installed on Lion and Mountain Lion OSes. So that is one threat dealt with, but this other threat seems a lot more complex for the average user to deal with. What they needed to do was have a website where you entered your device and it would tell you if you were at risk.


If you need to run Photoshop (certainly CS3), you need to install Java. I’ve not got it as a browser plugin though.

Author:  Amnesia10 [ Wed Jan 30, 2013 5:57 pm ]
Post subject:  Re: Homeland Security: Disable UPnP, as tens of millions at risk

paulzolo wrote:
Amnesia10 wrote:
As a mac user Java is not installed on Lion and Mountain Lion OSes. So that is one threat dealt with, but this other threat seems a lot more complex for the average user to deal with. What they needed to do was have a website where you entered your device and it would tell you if you were at risk.


If you need to run Photoshop (certainly CS3), you need to install Java. I’ve not got it as a browser plugin though.

I do not use Photoshop and do not have it as a browser plug in either.

Author:  Amnesia10 [ Wed Jan 30, 2013 6:04 pm ]
Post subject:  Re: Homeland Security: Disable UPnP, as tens of millions at risk

saspro wrote:
Amnesia10 wrote:
l3v1ck wrote:
Gibson research has had a thing about UPnP on it's site for years

I went to the Gibson site to do a Shields Up test and with the exception of the ping test it passed. Does anyone know how I can stop my machine responding to Pings?


You need to set that on your router if you're testing your external address

But what do I need to look out for and change. I cannot see where it says ping.

Author:  JJW009 [ Wed Jan 30, 2013 6:20 pm ]
Post subject:  Re: Homeland Security: Disable UPnP, as tens of millions at risk

Amnesia10 wrote:
But what do I need to look out for and change. I cannot see where it says ping.

There is sometimes an entry called "ICMP echo response" on a firewall or security page, although on my Netgear it's just called ping and it's on the WAN page.

Author:  Amnesia10 [ Wed Jan 30, 2013 6:50 pm ]
Post subject:  Re: Homeland Security: Disable UPnP, as tens of millions at risk

JJW009 wrote:
Amnesia10 wrote:
But what do I need to look out for and change. I cannot see where it says ping.

There is sometimes an entry called "ICMP echo response" on a firewall or security page, although on my Netgear it's just called ping and it's on the WAN page.

Yes it was on the WAN page, "Respond to internet ping" so have unchecked that box and it passed the common ports test, now doing an all ports test. uPnP has also being blocked so that should make my system safer.

Thanks for everyones help.

Author:  MrStevenRogers [ Wed Jan 30, 2013 9:57 pm ]
Post subject:  Re: Homeland Security: Disable UPnP, as tens of millions at risk

had UPnP disabled on any router or system that i have used (if it was enabled)
after the heads up from Mr Gibson years ago
this man most certainly knows security ...

Author:  Amnesia10 [ Wed Jan 30, 2013 11:24 pm ]
Post subject:  Re: Homeland Security: Disable UPnP, as tens of millions at risk

MrStevenRogers wrote:
had UPnP disabled on any router or system that i have used (if it was enabled)
after the heads up from Mr Gibson years ago
this man most certainly knows security ...

Yes I have used the Shields Up test page for many years. Some people have a problem with Gibson but I cannot remember why.

Page 1 of 1 All times are UTC
Powered by phpBB® Forum Software © phpBB Group
https://www.phpbb.com/