Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Many home routers supplied by ISPs can be compromised en masse, researchers say
CSO ^ | 10 August, 2014 23:33 | Lucian Constantin (IDG News Service)

Posted on 08/11/2014 9:36:34 PM PDT by Utilizer

Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn.

By gaining access to such servers, hackers or intelligence agencies could potentially compromise millions of routers and implicitly the home networks they serve, said Shahar Tal, a security researcher at Check Point Software Technologies. Tal gave a presentation Saturday at the DefCon security conference in Las Vegas.

At the core of the problem is an increasingly used protocol known as TR-069 or CWMP (customer-premises equipment wide area network management protocol) that is leveraged by technical support departments at many ISPs to remotely troubleshoot configuration problems on routers provided to customers.

According to statistics from 2011, there are 147 million TR-069-enabled devices online and an estimated 70 percent of them are residential gateways, Tal said. Based on scans of the Internet Protocol version 4 address space, the 7547 port, which is associated with TR-069, is the second most frequently encountered service port after port 80 (HTTP), he said.

TR-069 devices are set up to connect to Auto Configuration Servers (ACS) operated by ISPs. These servers run specialized ACS software developed by third-party companies that can be used to re-configure customer devices, monitor them for faults and malicious activity, run diagnostics and even silently upgrade their firmware.

(Excerpt) Read more at cso.com.au ...


TOPICS: Computers/Internet; Conspiracy
KEYWORDS: computers; hacking; isp; routers
Navigation: use the links below to view more comments.
first 1-2021-4041-45 next last
Technical reference post, mainly for feedback from helpful FReepers knowledgeable about difficulties such as this, and for those who are depending upon ISP-supplied routers for their net access.
1 posted on 08/11/2014 9:36:34 PM PDT by Utilizer
[ Post Reply | Private Reply | View Replies]

To: Utilizer
Does blocking port 7547 help?

Does it need to be done on the router, or on every computer?

How do you block a port on a tablet or a phone?

2 posted on 08/11/2014 9:43:24 PM PDT by texas booster (Join FreeRepublic's Folding@Home team (Team # 36120) Cure Alzheimer's!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Nailbiter

bflr perusal


3 posted on 08/11/2014 9:44:44 PM PDT by Nailbiter
[ Post Reply | Private Reply | To 1 | View Replies]

To: texas booster

According to what I was able to glean from the article, you must have root access to the device to be able to change this setting, as the port and the TR-069 protocol are not on the end-users standard menu options.

Perhaps one of the more knowledgeable FReepers who work closely with these devices can suggest a workaround.


4 posted on 08/11/2014 9:49:29 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them-)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Utilizer

Drop the ISP provided router and get a real one preferably one that supports ddwrt or other aftermarket firmware. You can often put the ISP provided garbage in bridged mode where is functions as a modem only.

I dumped that crap all in one box comcast supplied and purchased a modem. It paid for itself through eliminating rental fees. I run two linksys routers that run ddwrt firmware. It’s open source and allows tons of amazing and business level functionality. It’s also easy to configure and their page has instructions. If you can follow directions, you can flash and use ddwrt.

If you are stuck with ISP equipment, ask about bridged mode. Also, don’t run default passwords for router access and always lock down wifi. Wpa2 AES is sufficient. Don’t use WEP or WPS


5 posted on 08/11/2014 10:17:38 PM PDT by drunknsage
[ Post Reply | Private Reply | To 1 | View Replies]

To: drunknsage

Thank you for chiming in. I was hoping someone more familiar with the equipment might have some advice.

I dumped the SBC/Yahoo -supplied router many years ago and got a combination DSL modem,wireless router/4-port LAN router made by Netgear. Recently I have been considering upgrading, but so far the options available have made that a daunting prospect.

Any suggestions on which way to go, now that this exploit has been discovered?


6 posted on 08/11/2014 10:24:33 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them-)
[ Post Reply | Private Reply | To 5 | View Replies]

To: drunknsage
While the article uses the term router, replacing your Isp router with a home router would probably not resolve.. ..the open port is for isp management so would be customer edge facing the provider edge..and would be on you isp modem.. (the modem is an Internet gateway router).

That said.. I always use my own router for my home network and just use the isp modem for the Internet gateway.. a personal home router with a stateful firewall should protect your internal network.. but your internet traffic has to route across the isp modem.. so unless you got your own cryto tunnel for all internet traffic your exposed

7 posted on 08/11/2014 10:39:34 PM PDT by tophat9000 (An Eye for an Eye, a Word for a Word...nothing more)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Utilizer

Spend the money and get a commercial router...

You can block whatever port you want.


8 posted on 08/11/2014 10:57:10 PM PDT by Vendome (Don't take life so seriously-you won't live through it anyway-Enjoy Yourself ala Louis Prima)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer
Always install your own independently procured router behind whatever your ISP provides. Then connect your household devices to your router's LAN ports and WiFi access points.

Take charge of your router. Think of your router's WAN port as the wild wild internet and minimize the "attack surface" by not forwarding any ports to your LAN unless you know what you are doing. Don't enable your router's remote management interface. Do put a password on your router's LAN-facing management interface (that way, if you accidentally ingest a hack, at least, it won't be able to reprogram your router). Do look through your router's logs from time to time.

9 posted on 08/11/2014 11:02:00 PM PDT by cynwoody
[ Post Reply | Private Reply | To 1 | View Replies]

To: Vendome; cynwoody

Hmmm. Just recently bought an LG-Ericsson router on sale, but the owners manual does not specify how to configure it that I can recall.

The Netgear combo unit is easy enough, since the default gateway is http accessible through any browser...

Now I have to figure out how to access the router’s firmware menu, not to mention how to do the same with some much older routers I have in the storage area. Those are from the ‘doze 98 era though, so I do not know how much I will be able to play with them even from this linux machine.


10 posted on 08/11/2014 11:14:42 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them-)
[ Post Reply | Private Reply | To 8 | View Replies]

To: tophat9000

Yeah.....That’s what I did when I switched from cable to DSL with AT&T..

The service tech was of no help when I told him what I wanted to do, so after he left I got into the AT&T gateway and turned off the wireless router functions, then I simply used it as a modem and hooked it up to my Netgear router which has a server function that I needed. It also has plenty of user configurations for security.

I feel like I have more control, and since I don’t share data between the computers or devices on my network I simply use a 1TB drive hooked up to the router for sharing just as you would use a central server, I can set my security to a pretty high level for the wireless network and I have never had a problem with it.

Not sure if it’s the best way to do it, but that is what I came up with.


11 posted on 08/11/2014 11:14:51 PM PDT by Cold Heat (Have you reached your breaking point yet? If not now....then when?)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Utilizer

.


12 posted on 08/11/2014 11:27:16 PM PDT by ansel12 (LEGAL immigrants, 30 million 1980-2012, continues to remake the nation's electorate for democrats)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ansel12

?


13 posted on 08/11/2014 11:40:03 PM PDT by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them-)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Utilizer
Hmmm. Just recently bought an LG-Ericsson router on sale, but the owners manual does not specify how to configure it that I can recall.

The Netgear combo unit is easy enough, since the default gateway is http accessible through any browser...

I have an old D-Link from 2006 (firmware revision 2007/12/05). Its HTTP interface is good enough that there is no need for a manual. It does have a couple of bugs, but I don't often encounter them, and I know how to work around them.

I acquired it when the ActionTec that Verizon had provided crapped out. I needed on the internet, like, now! So, I threw the ActionTec in the trash, tethered my phone (illegal, but I'd earlier hacked it for the fun of it), researched alternatives, and ran out to buy the D-Link at the local Best Buy.

I'm sure a similar shopping expedition today would yield superior results.

Now I have to figure out how to access the router’s firmware menu, not to mention how to do the same with some much older routers I have in the storage area. Those are from the ‘doze 98 era though, so I do not know how much I will be able to play with them even from this linux machine.

Not worth the trouble, unless you are a computer museum curator or an exceptionally bored hacker.

14 posted on 08/11/2014 11:42:46 PM PDT by cynwoody
[ Post Reply | Private Reply | To 10 | View Replies]

To: Utilizer

The work around is to go down to best buy and spend 50 bucks for your own switch. The ones the cables companies provide are crap anyway.


15 posted on 08/12/2014 12:35:01 AM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: tophat9000

With verizon you don’t need their device. It’s an is address right off the fiber.


16 posted on 08/12/2014 12:38:15 AM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Utilizer
only advice I can offer is to rename your wireless router NSA Surveillance Network #1492
17 posted on 08/12/2014 1:43:49 AM PDT by Rodamala
[ Post Reply | Private Reply | To 6 | View Replies]

To: texas booster
Does blocking port 7547 help?

Besides blocking, you can also forward that port to an IP address that is not being used on your sub network. That way if blocking fails, any traffic for that port would be directed to a device that does not exist.

18 posted on 08/12/2014 1:58:04 AM PDT by TheCipher (Suppose you were an idiot and suppose you were a member of Congress. But I repeat myself- Mark Twain)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Utilizer
Good topic. I just received a new router from my ISP after the old one (10 yrs) crapped out.
I've been wondering if I should get a new one to replace it.
My security is set real tight and I do not use the WiFi availability.
19 posted on 08/12/2014 2:22:10 AM PDT by Tainan (Cogito, ergo conservatus sum -- "The Taliban is inside the building")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Rodamala

Mine is named something along those lines.


20 posted on 08/12/2014 2:27:55 AM PDT by gunsequalfreedom (Conservative is not a label of convenience. It is a guide to your actions.)
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-45 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson