Pervasive vulnerabilities in SOHO routers
Persistence of Vulnerabilities
The vulnerabilities described in this article, as well as several others from our research study, cannot be disabled by the user as a mitigation measure. The ACSD and HTTPD services cannot be disabled by the user, and in other cases, attacks against required services (e.g., cross-site scripting or cross-site request forgery attacks) can be used to re-enable user-disabled services, once again exposing them. Because administrators have no way of removing or disabling these services entirely, they will remain vulnerable indefinitely or until a firmware patch is released by the manufacturer.
Adding to the persistence of these issues is that all of the routers we assessed have very cumbersome, and unlikely to be enacted, update capabilities. By default, none of the routers update automatically; most of the routers do not provide a notice to administrators when updates are available, and all of the routers require an administrator to log in manually and embark specifically on a multistep firmware flashing process that is not always intuitive or understandable by the average consumer. For this reason, it is likely that these vulnerabilities will persist even after the manufacturers have provided the necessary fixes.
Finally, once a SOHO router has been compromised, the device should be decommissioned. The minimal actions that can be taken by the consumer to attempt to reset a device's firmware are insufficient to guarantee a firmware upgrade has been successful. An adversary in full control of the router should be capable of preventing or emulating a successful reset or upgrade.
YIKES! What Can You Do?
Unfortunately, consumers have few options for stopping these exploits, but a few best practices will substantially decrease the likelihood of exploitation. First and foremost, standard hardening steps should be taken, such as disabling unused services, enabling protocol encryption, and using strong passwords for administration interfaces and network services. Developers should be vigilant about following their own best practices to help thwart buffer overflow attacks, refrain from using unsafe functions (e.g., strcpy
, sprintf memcpy
, gets
), and perform bounds checking before copying user input to a fixed-length buffer. Additionally, the use of compile and link-time protections (e.g., ASLR, DEP, canary/stack cookies, Windows safeSEH) will greatly complicate exploitation should an overflow exist. Finally, and most importantly, consumers should take a proactive stance against SOHO router vendors by demanding that security be a priority. All too often, manufactures choose to ignore security because consumers don't demand it; until consumers demand more from manufacturers, it is unlikely they will change their tune.
Infos
- Exploiting SOHO routers: http://www.securityevaluators.com/knowledge/case_studies/routers/
- RT-N56U exploit: http://infosec42.blogspot.com/2014/01/exploit-asus-rt-n56u-remote-root-shell.html
« Previous 1 2 3
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Endless OS 6 has Arrived
After more than a year since the last update, the latest release of Endless OS is now available for general usage.
-
Fedora Asahi 40 Remix Available for Macs with Apple Silicon
If you've been anticipating KDE's Plasma 6 for your Apple Silicon-powered Mac, then you're in luck.
-
Red Hat Adds New Deployment Option for Enterprise Linux Platforms
Red Hat has re-imagined enterprise Linux for an AI future with Image Mode.
-
OSJH and LPI Release 2024 Open Source Pros Job Survey Results
See what open source professionals look for in a new role.
-
Proton 9.0-1 Released to Improve Gaming with Steam
The latest release of Proton 9 adds several improvements and fixes an issue that has been problematic for Linux users.
-
So Long Neofetch and Thanks for the Info
Today is a day that every Linux user who enjoys bragging about their system(s) will mourn, as Neofetch has come to an end.
-
Ubuntu 24.04 Comes with a “Flaw"
If you're thinking you might want to upgrade from your current Ubuntu release to the latest, there's something you might want to consider before doing so.
-
Canonical Releases Ubuntu 24.04
After a brief pause because of the XZ vulnerability, Ubuntu 24.04 is now available for install.
-
Linux Servers Targeted by Akira Ransomware
A group of bad actors who have already extorted $42 million have their sights set on the Linux platform.
-
TUXEDO Computers Unveils Linux Laptop Featuring AMD Ryzen CPU
This latest release is the first laptop to include the new CPU from Ryzen and Linux preinstalled.