Owners and administrators of Linksys home routers are being advised
to update and secure their devices following reports of active attacks
on a flaw present in at least two models.
Researchers with the SANS Institutes Internet Storm Center have received reports
of mass attacks on a remote access vulnerability in the Linksys E1000
and E1200. The reports, which were noted by an ISP administrator in
Wyoming, claim that some customers running the Linksys routers have had
their networks compromised.
According to the reports, the compromised routers scanned network
traffic rapidly on port 80/8080, saturating available bandwidth, and in
some cases their DNS settings were modified.
While the exact
nature of the flaw being exploited is not yet known, early speculation
is that the issue could be related to components using the home network
administration protocol (HNAP).
SANS noted that E1200 routers with
the latest 2.0.06 firmware version seemed to be immune to the spotted
attacks, but the E1000s – which are no longer supported – were not, even
with the most recent firmware installed.
Linksys did not return a request to confirm or comment on the reports.
Dr. Johannes Ullrich, chief research officer with the SANS Institute, told The Reg
that in addition to updating firmware, owners and administrators of the
vulnerable routers should look to tighten their administrator access
controls.
"They should either turn off remote admin functionality,
or restrict it to IP addresses from which they need to access the
router if they can," Ullrich said.
The report comes not long after word surfaced of
other security vulnerabilities found in routers made by Linksys' former
parent company, Cisco. Those flaws affected a number of small business
products from Cisco, and did not impact any Linksys branded devices
No comments:
Post a Comment