• February 22, 2025, 03:20:32 PM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

This Forum Beta is ONLY for registered owners of D-Link products in the USA for which we have created boards at this time.

Author Topic: UPNP Security flaw - Are we affected?  (Read 8287 times)

titan3025

  • Level 2 Member
  • **
  • Posts: 41
UPNP Security flaw - Are we affected?
« on: January 31, 2013, 07:10:48 AM »

Hi

I read that there is a severe security flaw out there with regards to the UPNP implementation of millions of home user routers.

https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play

I assume we are also affected with our 825. Any idea if we will get a fix? Scary somehow.

Titan3025
Logged

FurryNutz

  • Poweruser
  •   ▲
    ▲ ▲
  • *****
  • Posts: 49923
  • D-Link Global Forum Moderator
    • Router Troubleshooting
Re: UPNP Security flaw - Are we affected?
« Reply #1 on: January 31, 2013, 07:48:00 AM »

Acutually there has been known issues with uPnP for a long time now.

http://www.grc.com/unpnp/unpnp.htm

For the 10 years I've been working with routers in a home setting, I've never seen much of any issues regarding uPnP. Especially in a home or small business setting. I personally feel that if something is going to happen, it's going to be on a bigger scale directed towards bigger companies, enterprise networks, government and military networks rather than our mom and pop house holds. Not much information to gleam from us here. Thats not to discount that it could happen however.

I'll get this over to D-Link for there review and see if anything comes up.

I recommend that if your really concerned about it, just disable uPnP on the router under Advanced/Adv Networking and you should sleep better at night. I also recommend that you phone contact Dlink support, ask for level 3 or higher support in regards to this to see if they can provide you with any information.


Let us know what they say.
Logged
Cable: 1Gb/50Mb>NetGear CM1200>DIR-882>HP 24pt Gb Switch. COVR-1202/2202/3902,DIR-2660/80,3xDGL-4500s,DIR-LX1870,857,835,827,815,890L,880L,868L,836L,810L,685,657,3x655s,645,628,601,DNR-202L,DNS-345,DCS-933L,936L,960L and 8000LH.

ThatOtherGuy

  • Level 1 Member
  • *
  • Posts: 5
Re: UPNP Security flaw - Are we affected?
« Reply #2 on: March 01, 2013, 04:58:33 PM »

Your reply makes it look like you did not read up on the topic. Yes for the last 10 or so years upnp never had an exploit like this. This changed though the exploit allows the router to be configured form the outside. Attacks using it could be aimed at a company but the way its going on now is with scanning of ip blocks to see what routers are vulnerable. The tools can then log what routers are vulnerable and spit out a log or do other things like run scripts ect.

I can't blame you for not knowing much on the topic but its the attitude of "well nothing bad ever happened" Is what leaves company's and individuals open to attack by very simple means.

The very least they should do is inform people to disable UpNp on all of the dlink routers effected until they can fix the problem. Keeping quite about it and doing nothing wont make it go away and if it stays that way and millions of people get hacked and dlinks name gets dragged through the mud for not acting when they had the chance it will be too late.

Logged

FurryNutz

  • Poweruser
  •   ▲
    ▲ ▲
  • *****
  • Posts: 49923
  • D-Link Global Forum Moderator
    • Router Troubleshooting
Re: UPNP Security flaw - Are we affected?
« Reply #3 on: March 01, 2013, 05:01:10 PM »

One way to get them more involved would be to contact them on the phone and say something.  ;)
Logged
Cable: 1Gb/50Mb>NetGear CM1200>DIR-882>HP 24pt Gb Switch. COVR-1202/2202/3902,DIR-2660/80,3xDGL-4500s,DIR-LX1870,857,835,827,815,890L,880L,868L,836L,810L,685,657,3x655s,645,628,601,DNR-202L,DNS-345,DCS-933L,936L,960L and 8000LH.

FurryNutz

  • Poweruser
  •   ▲
    ▲ ▲
  • *****
  • Posts: 49923
  • D-Link Global Forum Moderator
    • Router Troubleshooting
Re: UPNP Security flaw - Are we affected?
« Reply #4 on: February 26, 2014, 11:14:25 AM »

« Last Edit: September 19, 2014, 10:39:22 AM by FurryNutz »
Logged
Cable: 1Gb/50Mb>NetGear CM1200>DIR-882>HP 24pt Gb Switch. COVR-1202/2202/3902,DIR-2660/80,3xDGL-4500s,DIR-LX1870,857,835,827,815,890L,880L,868L,836L,810L,685,657,3x655s,645,628,601,DNR-202L,DNS-345,DCS-933L,936L,960L and 8000LH.

FurryNutz

  • Poweruser
  •   ▲
    ▲ ▲
  • *****
  • Posts: 49923
  • D-Link Global Forum Moderator
    • Router Troubleshooting
Re: UPNP Security flaw - Are we affected?
« Reply #5 on: September 19, 2014, 10:47:25 AM »

"Publication ID: SAP10036
Resolved Status: Yes
Published on: 3 July 2014 1:10 GMT
Last updated on: 21 August 2014 10:47 GMT
Overview
 
Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence on the network and establish functional network services for data sharing, communications, and entertainment.

D-Link deploys firmware that has UPnP feature support on our devices. The UPnP features are enabled by software developer kits - Intel, Portable, and miniUPnP.

In January 2013, it was discovered that the following UPnP versions may have a security vulnerability that could cause devices to become unstable, impair functionality, or disclose the services the devices offers (i.e. network camera feed):
All Versions of Intel SDK
Version of Portable SDK prior to V. 1.6.18
Version of MiniUPnP SDK prior to V. 1.1
Security and performance is of the utmost importance to D-Link across all product lines, including networking, surveillance, storage and entertainment solutions.

The company is currently assessing the recent findings surrounding UPnP technology and whether any D-Link products are susceptible to vulnerabilities. 
 
We are currently updating our Vendor responses at US-CERT (US Computer Emergency Readiness Team) for the support CVEs (Common Vulnerabilities and Exposures).

We also discourage the use of industry-available tools available to the public because of the number of false-negatives and false-positives. This potential vulnerability is complex and requires deeper inspection and replacement of the recommend SDK stated in the CVEs. "

D-Link Current uPnP Security Status
Logged
Cable: 1Gb/50Mb>NetGear CM1200>DIR-882>HP 24pt Gb Switch. COVR-1202/2202/3902,DIR-2660/80,3xDGL-4500s,DIR-LX1870,857,835,827,815,890L,880L,868L,836L,810L,685,657,3x655s,645,628,601,DNR-202L,DNS-345,DCS-933L,936L,960L and 8000LH.