What's new

Asus RT-N66U also effected: UPnP flaws expose 50 million devices to attack, ...

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

joegreat

Very Senior Member
Hi,

"Millions of consumer devices using the ubiquitous Universal Plug and Play (UPnP) protocol, including routers, printers, media servers and webcams, are vulnerable to a cocktail of dangerous security vulnerabilities, pen-testing outfit Rapid7 has discovered."

Full article can be found here. :confused:

Windows users could download the free and simple ScanNow tool to check for vulnerable endpoints. :rolleyes:

The scan showed that also our Asus Router is also effected by the bad UPnP implementation.
I really wonder why the hell UPnP is exposed to the internet by the routers? :mad:

With kind regards
Joe :cool:
 
You have to make sure it says exploitable not just identified.

I have UPnP enabled and the routers IP is identified as having UPnP but if you look at exploitable it comes up zero.
 

Attachments

  • scan.jpg
    scan.jpg
    78.3 KB · Views: 799
I'm not going to install Java so that I can run the scanner *smile*, but seems like turning off UPNP might help, too. There's also a WPS exploit, not sure where Asus routers stand on that one, either. So I keep that turned off as well *smile*.
 
You have to make sure it says exploitable not just identified.

I have UPnP enabled and the routers IP is identified as having UPnP but if you look at exploitable it comes up zero.

Does that test only scans from inside your LAN? If that's the case, then it's half meaningless. What would be far more important is whether it's exploitable on the WAN side. Cause if someone already has LAN access, then you already have far more pressing security concerns than uPNP ;)
 
I'm not going to install Java so that I can run the scanner *smile*, but seems like turning off UPNP might help, too. There's also a WPS exploit, not sure where Asus routers stand on that one, either. So I keep that turned off as well *smile*.

Considering a description of the WPS exploit is even written down in the Asuswrt source code comments, I assume it means it was fixed long ago (unless you're referring to a different attack vector).
 
You have to make sure it says exploitable not just identified.

I have UPnP enabled and the routers IP is identified as having UPnP but if you look at exploitable it comes up zero.

I got the same result when I tested so I don't see a problem.
 
howto turn off Upnp

Here's a super-noob question...

How and where do you turn off Upnp on the RT-N66U?
 
For those who want independent confirmation

For those who want independent confirmation, or who also run other model routers: Check this thread for a posting by user MintyTrebor: A probe for these vulnerabilities is online avaliable (no install or registration required, all done from a web page).

With kind regards
Joe :cool:

My results are:

Your equipment at IP: xxx.yyy.zzz.nnn

Is now being queried:
THE EQUIPMENT AT THE TARGET IP ADDRESS
DID NOT RESPOND TO OUR UPnP PROBES!
(That's good news!)
 
lol this was news back when windows 95 was released. I've had upnp disabled ever since.. yes im cool :rolleyes:
 

Similar threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top