Friday , October 18 2019
Home / greece / Security vulnerabilities on a popular router

Security vulnerabilities on a popular router



Researchers have discovered 125 security vulnerabilities on 13 popular SOHO routers and NAS devices, making these models vulnerable to remote attacks and thus endangering millions of users.

The research by Independent Security Evaluators (ISE), an independent security consulting firm, ranged from widely used models to high-end business-grade devices, with the focus being primarily on devices from well-known and trusted manufacturers. Each of the 13 devices was found to contain at least one security vulnerability in the Web Application, which could be used by an intruder to gain remote access to the device or control panel, and from there, to further attacks within a home or corporate network. Gaps in authentication and authorized access issues were also identified. ISE reported the research findings to the manufacturers, some of whom rushed to fix the problems, but some did not respond in time.

These findings show that routers can be attacked fairly easily, making them the Achilles' heel of overall Internet security. For this reason, and regardless of the model used, ESET recommends that each user take some time and check five key points on a router's security.

Password. Many users do not change the password when installing the router on the network, however the pre-installed codes of all the router can be easily found with a simple web search. For this reason, strong usernames and usernames need to be changed and used.

Creating separate networks. Most modern routers offer the ability to create a separate network for each purpose, while some models have firewalls that allow the analysis of incoming and outgoing traffic and determine which connections are allowed. These functions can separate the most 'sensitive' devices or isolate some from the rest of the network.

Disable unused services and features. If remote network access is not necessary, you need to control the management services via secure protocols (SSH, HTTPS) and disable any unused features, as well as disconnect all connected devices such as camera, microphone etc. This is how the back door closes to hackers and nosy neighbors.

Regular inspection. In order to be able to detect unusual behavior or detect a potential intruder, the network owner must be constantly able to identify how many and to which devices they are connected, which is achieved if there is little time for verification at regular intervals.

Update the firmware. As with most IoT devices, operating system updates do not happen automatically, so the user needs to know the router model and firmware version to visit the manufacturer's site and check for an updated version for installation.


Source link