{"id":5470,"date":"2013-02-22T11:30:54","date_gmt":"2013-02-22T00:30:54","guid":{"rendered":"http:\/\/mingersoft.com\/blog\/?p=5470"},"modified":"2013-02-18T20:36:46","modified_gmt":"2013-02-18T09:36:46","slug":"check-your-router-for-universal-plug-and-play-vulnerability","status":"publish","type":"post","link":"https:\/\/mingersoft.com\/blog\/2013\/02\/check-your-router-for-universal-plug-and-play-vulnerability\/","title":{"rendered":"Check Your Router for Universal Plug and Play Vulnerability"},"content":{"rendered":"<p>In the news recently, it was discovered that a whole stack of consumer routers have copied and pasted Intel&#8217;s UPnP reference code into their router firmware. Unfortunately, the UPnP protocol was designed to be used on private networks in order to allow for the automatic configuration of port forwarding thus avoiding the need for regular users to work out how to do that manually. The reference code from Intel had no built in security and also made no specifications as to where the protocol should be made available which resulted in UPnP being accessible from the public internet.<\/p>\n<p>Ultimately, this could allow malicious people to reconfigure your network from outside without any authentication &#8211; oops.<\/p>\n<p>Luckily, there is an easy way to find out if your network is at risk:<\/p>\n<ol>\n<li><span style=\"font-size: 12px; line-height: 18px;\">Head on over to <\/span><a style=\"font-size: 12px; line-height: 18px;\" title=\"ShieldsUP | GRC\" href=\"https:\/\/www.grc.com\/x\/ne.dll?bh0bkyd2\" target=\"_blank\">GRC&#8217;s ShieldsUP page<\/a>,<span style=\"font-size: 12px; line-height: 18px;\"><br \/>\n<\/span><\/li>\n<li>Click the\u00a0<strong>Proceed<\/strong> button,<\/li>\n<li>On the following page, click on the orange button that says\u00a0<strong>GRC&#8217;s Instant UPnP Exposure Test,<\/strong><\/li>\n<li>Wait for the results.<\/li>\n<\/ol>\n<p>If the response comes back as either\u00a0<strong>No Response<\/strong> or\u00a0<strong>Rejected<\/strong> then that&#8217;s a good thing but if it comes back with an\u00a0<strong>Exposed<\/strong> result then you should consider looking in your router&#8217;s settings and turning off UPnP.<\/p>\n<p>Hopefully, router manufacturers will update vulnerable firmware but this would be more likely for newer routers whilst older routers would be left stranded. If this is the case with your router, you may consider checking out if a third party firmware <a title=\"Tomato Firmware with IPv6 | Boydo's Tech Talk\" href=\"http:\/\/mingersoft.com\/blog\/2012\/10\/tomato-firmware-with-ipv6\/\" target=\"_blank\">such as Tomato<\/a> is supported and, if so, installing it. If your router is old then you have no warranty to void and the only thing to worry about is the actual upgrade process itself.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the news recently, it was discovered that a whole stack of consumer routers have copied and pasted Intel&#8217;s UPnP reference code into their router firmware. Unfortunately, the UPnP protocol was designed to be used on private networks in order to allow for the automatic configuration of port forwarding thus avoiding the need for regular &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/mingersoft.com\/blog\/2013\/02\/check-your-router-for-universal-plug-and-play-vulnerability\/\">Continue reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[253,205,18],"tags":[731,1134,1881],"class_list":["post-5470","post","type-post","status-publish","format-standard","hentry","category-firewall","category-security-technology","category-technology","tag-grc","tag-router","tag-upnp","item-wrap"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/posts\/5470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/comments?post=5470"}],"version-history":[{"count":0,"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/posts\/5470\/revisions"}],"wp:attachment":[{"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/media?parent=5470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/categories?post=5470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mingersoft.com\/blog\/wp-json\/wp\/v2\/tags?post=5470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}