Pervasive vulnerabilities in SOHO routers
Persistence of Vulnerabilities
The vulnerabilities described in this article, as well as several others from our research study, cannot be disabled by the user as a mitigation measure. The ACSD and HTTPD services cannot be disabled by the user, and in other cases, attacks against required services (e.g., cross-site scripting or cross-site request forgery attacks) can be used to re-enable user-disabled services, once again exposing them. Because administrators have no way of removing or disabling these services entirely, they will remain vulnerable indefinitely or until a firmware patch is released by the manufacturer.
Adding to the persistence of these issues is that all of the routers we assessed have very cumbersome, and unlikely to be enacted, update capabilities. By default, none of the routers update automatically; most of the routers do not provide a notice to administrators when updates are available, and all of the routers require an administrator to log in manually and embark specifically on a multistep firmware flashing process that is not always intuitive or understandable by the average consumer. For this reason, it is likely that these vulnerabilities will persist even after the manufacturers have provided the necessary fixes.
Finally, once a SOHO router has been compromised, the device should be decommissioned. The minimal actions that can be taken by the consumer to attempt to reset a device's firmware are insufficient to guarantee a firmware upgrade has been successful. An adversary in full control of the router should be capable of preventing or emulating a successful reset or upgrade.
YIKES! What Can You Do?
Unfortunately, consumers have few options for stopping these exploits, but a few best practices will substantially decrease the likelihood of exploitation. First and foremost, standard hardening steps should be taken, such as disabling unused services, enabling protocol encryption, and using strong passwords for administration interfaces and network services. Developers should be vigilant about following their own best practices to help thwart buffer overflow attacks, refrain from using unsafe functions (e.g., strcpy
, sprintf memcpy
, gets
), and perform bounds checking before copying user input to a fixed-length buffer. Additionally, the use of compile and link-time protections (e.g., ASLR, DEP, canary/stack cookies, Windows safeSEH) will greatly complicate exploitation should an overflow exist. Finally, and most importantly, consumers should take a proactive stance against SOHO router vendors by demanding that security be a priority. All too often, manufactures choose to ignore security because consumers don't demand it; until consumers demand more from manufacturers, it is unlikely they will change their tune.
Infos
- Exploiting SOHO routers: http://www.securityevaluators.com/knowledge/case_studies/routers/
- RT-N56U exploit: http://infosec42.blogspot.com/2014/01/exploit-asus-rt-n56u-remote-root-shell.html
« Previous 1 2 3
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Direct Download
Read full article as PDF:
Price $2.95
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Find SysAdmin Jobs
News
-
SparkyLinux 6.6 Now Available for Installation
The Debian-based SparkyLinux has a new point release that retools the live USB desktop creator and other changes that give it shiny new-ness.
-
SparkyLinux 6.6 Now Available for Installation
The Debian-based SparkyLinux has a new point release that retools the live USB desktop creator and other changes that give it shiny new-ness.
-
Escuelas Linux 8.0 Now Available
Just in time for its 25th anniversary, the developers of Escuelas Linux have released the latest version.
-
LibreOffice 7.5 Loaded with New Features and Improvements
The favorite office suite of the Linux community has a new release that includes some visual refreshing and new features across all modules.
-
The Next Major Release of Elementary OS Has Arrived
It's been over a year since the developers of elementary OS released version 6.1 (Jólnir) but they've finally made their latest release (Horus) available with a renewed focus on the user.
-
KDE Plasma 5.27 Beta Is Ready for Testing
The latest beta iteration of the KDE Plasma desktop is now available and includes some important additions and fixes.
-
Netrunner OS 23 Is Now Available
The latest version of this Linux distribution is now based on Debian Bullseye and is ready for installation and finally hits the KDE 5.20 branch of the desktop.
-
New Linux Distribution Built for Gamers
With a Gnome desktop that offers different layouts and a custom kernel, PikaOS is a great option for gamers of all types.
-
System76 Beefs Up Popular Pangolin Laptop
The darling of open-source-powered laptops and desktops will soon drop a new AMD Ryzen 7-powered version of their popular Pangolin laptop.
-
Nobara Project Is a Modified Version of Fedora with User-Friendly Fixes
If you're looking for a version of Fedora that includes third-party and proprietary packages, look no further than the Nobara Project.