Vulnerabilities / Threats
1/29/2013
11:35 AM
50%
50%

Unplug Universal Plug And Play: Security Warning

Tens of millions of devices with UPnP are remotely exploitable, warns Metasploit creator. New tool detects vulnerable devices, which include 6,900 different product versions spanning 1,500 vendors.

More than 23 million Internet-connected devices are vulnerable to being exploited by a single UDP packet, while tens of millions more are at risk of being remotely exploited.

That warning was issued Tuesday by vulnerability management and penetration testing firm Rapid7, which said its researchers spent six months studying how many universal plug and play (UPnP) devices are connected to the Internet -- and what the resulting security implications might be. The full findings have been documented in a 29-page report, "Security Flaws In Universal Plug and Play."

"The results were shocking, to the say the least," according to a blog post from report author HD Moore, chief security officer of Rapid7 and the creator of the open source penetration testing toolkit Metasploit. "Over 80 million unique IPs were identified that responded to UPnP discovery requests from the Internet."

UPnP is a set of standardized protocols and procedures that are designed to make network-connected and wireless devices easy to use. Devices that use the protocol -- which is aimed more at residential users rather than enterprises -- include everything from routers and printers to network-attached storage devices and smart TVs.

[ Despite Oracle's efforts to fix Java-related vulnerabilities, Java Security Work Remains, Bug Hunter Says. ]

Despite its convenience, approximately 45 million of the UPnP-using IP addresses spotted by Rapid7 led to a device that's vulnerable to one of three attacks, which are outlined in the company's report. "All told, we were able to identify over 6,900 product versions that were vulnerable through UPnP. This list encompasses over 1,500 vendors and only took into account devices that exposed the UPnP SOAP service to the Internet, a serious vulnerability in of itself," Moore said.

"We strongly suggest that end users, companies and ISPs take immediate action to identify and disable any Internet-exposed UPnP endpoints in their environments," said Moore. "UPnP is pervasive -- it is enabled by default on many home gateways, nearly all network printers and devices ranging from IP cameras to network storage servers."

To help people spot vulnerable UPnP devices, Rapid7 released ScanNow for Universal Plug and Play. The free scanner for Windows can be used to "identify exposed UPnP endpoints in your network and flag which of those may [be] remotely exploitable through recently discovered vulnerabilities," said Moore. The exploitable vulnerabilities have already been added to the Metasploit open source penetration testing framework.

One of the most likely targets of a UPnP attack would be routers, since attackers could alter the DNS settings to point the device to an attacker-controlled server. At that point, the attacker could use the router to send spam, run a clickjacking scam to profit from false advertising impressions, or even eavesdrop on all traffic being sent through the device.

Interestingly, Moore found that 73% of all discovered Internet-facing UPnP instances were built with one of just four software development kits, and versions of two of those kits -- MiniUPnPd and Portable SDK for UPnP -- contain remotely exploitable vulnerabilities. "In the case of the Portable SDK for UPnP, over 23 million IPs are vulnerable to remote code execution through a single UDP packet," he said.

Some of the exploitable flaws have already been patched in the software development toolkits, such as Portable UPnP SDK version 1.6.18, which was released this week. But even with the SDK fixes, don't expect patches to be released for most of the vulnerable devices. "It will take a long time before each of the application and device vendors incorporate this patch into their products," said Moore. "In most cases, network equipment that is 'no longer shipping' will not be updated at all, exposing these users to remote compromise until UPnP is disabled or the product is swapped for something new."

Indeed, the exploitable flaws spotted in the MiniUPnP SDK were excised from the software more than two years ago. "Yet over 330 products are still using older versions," said Moore.

This isn't the first security warning involving UPnP devices. For example, US-CERT issued a security alert in 2008 after finding that the devices could be exploited via a malicious Flash file, which could be used to infect a victim's system and then take control over any connected device that supports UPnP. In 2001, meanwhile, researchers at eEye warned that vulnerabilities in Microsoft's implementation of UPnP -- later patched -- could be exploited to trigger a buffer overflow and give an attacker access to any default installation of Windows XP.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.