[ale] nasty UPNP bug allows EXTERNAL hackers INTERNAL access

Jay Lozier jslozier at gmail.com
Thu Feb 7 21:31:25 EST 2013


Ron

Thanks for the link. My router was good.

Jay

On 02/07/2013 03:06 PM, Ron Frazier (ALE) wrote:
> Hi all,
>
> I wanted to let you know about a nasty bug in the UPNP implementation 
> of millions of routers.  This could allow an external hacker free and 
> open access to your internal network.  I think this mainly applies to 
> home and small office routers, but this could apply to commercial ones 
> as well.
>
> UPNP stands for Universal Plug and Play.  It is a feature of almost 
> all routers that is usually on by default.  It allows things INTERNAL 
> to your network, like XBox game systems, Skype, DVR's and other things 
> to OPEN HOLES for incoming communications through your firewall, 
> usually without your knowledge or permission, and sometimes without 
> your ability to monitor or control it.  This is designed to allow 
> gamers, for example, to instantly participate in network gaming 
> without configuring the router.  It generally doesn't require 
> authentication, and assumes anyone making a UPNP request from within 
> your network is trustworthy.  This, in itself, is somewhat of a 
> security risk, and I've had UPNP turned off for years on my routers.  
> It's one of the first things I disable when I set up a router, since I 
> have no need for it.
>
> They discussed the new issue, which is much much worse, on the last 
> two Security Now podcasts.
>
> http://twit.tv/sn
> http://twit.tv/show/security-now/389
> https://www.youtube.com/watch?v=wEa43qM4JjQ#t=09m44s  (Youtube video 
> of 389.  Relevant part starts at 09:44.)
> http://media.grc.com/sn/sn-389.mp3 - MP3 audio of 389.
> http://twit.tv/show/security-now/390
> http://www.grc.com/securitynow.htm  (Episode 390 hasn't been posted 
> here yet, but should be shortly.)
>
> UPNP was always intended to be used only on your INTERNAL LAN.  It was 
> never intended to be exposed on the Internet on the WAN.  A group of 
> security researchers at Rapid7 spent months last year using bots to 
> probe EVERY routable IPv4 address on the Internet. They sent UDP UPNP 
> discovery packets to every address several times.  The results of the 
> probes were both surprising and very disconcerting.
>
> They found that 2.2% of ALL IPv4 routers exposed to the internet 
> responded to UPNP discovery requests.  This corresponds to 81 MILLION 
> routers.  This means that they are exposing the UPNP service to the 
> EXTERNAL internet at large.  This is a MAJOR security flaw.  Of those, 
> 20%, or 16.2 MILLION are exposing their SOAP API to the EXTERNAL 
> internet at large.
>
> This means that a REMOTE cracker, just by sending a few UDP packets to 
> your router's EXTERNAL address, can punch holes in your firewall and 
> break into your INTERNAL LAN just as though he was your XBOX sitting 
> in your house.  It requires no authentication or decryption on the 
> cracker's part, and is trivially easy.
>
> This is very bad news for the 81 million people, most of which, don't 
> even know they are vulnerable.
>
> For years, Steve Gibson has been operating the Shields Up service on 
> his website.  It provides a way to scan your network from the outside 
> to see if net bios is being exposed, or if common TCP service ports 
> are being exposed.  In light of these events, he has added testing for 
> the UPNP vulnerability.
>
> I would recommend that each person reading this make use of Steve's 
> port scanner to test your router's external IPv4 address to determine 
> if you are vulnerable to the UPNP attack vector. Here's how.
>
> Go to the Shields Up main page at: https://www.grc.com/x/ne.dll?bh0bkyd2
>
> You will probably have to trust grc.com in noscript, etc. for 
> everything to work.  Read what it says there and click proceed. Keep 
> in mind, some of the verbiage is a decade old, but the site is still 
> very useful.  The stuff related to UPNP is new.
>
> Once you're on the second page, you will get to a screen with some 
> menu buttons on it.
>
> Click the orange GRC's Instant UPNP Exposure Test button.
>
> His server will query the UPNP ports for your external IPv4 address.  
> It will then report back as to whether your router didn't respond at 
> all (PREFERABLE), actively rejected the remote request (OK), or did 
> respond to the UPNP discovery request (BAD). The result page also 
> contains verbiage explaining the results.
>
> Note that a simple port scan, like from nmap, will not do the trick 
> here.  First, you have to send the scan from outside your router, on 
> the internet side.  Second, the UPNP discovery request is a 
> specifically formatted UDP packet, not just a simple ping. Since it's 
> UDP, the source address can be spoofed by a cracker.
>
> If your router is in the category that did respond, you are 
> potentially vulnerable to attack.  At the very least, a cracker could 
> find out that your UPNP service is listening on the WAN, and it will 
> probably tell him which UPNP stack you have in its reply. This may 
> give him the info he needs to attack you.  If your router is among the 
> 1 in 5 (of the 81 million) that exposes its SOAP API to the WAN, you 
> are vulnerable to immediate attack.  If your router responds to an 
> external UPNP request, which it NEVER should, you should find a way to 
> turn off that functionality and retest it.  If you cannot turn it off, 
> you should discontinue using this router.
>
> While you're there on the Shields Up page, you can select other 
> buttons as follows:
>
> File Sharing - tests to see if your router is exposing any net bios 
> file sharing ports to the WAN.
> Common Ports - tests to see if certain commonly used TCP service ports 
> are listening on the WAN.
> All Service Ports - tests to see if the first 1056 TCP service ports 
> are listening on the WAN
> User Specified Custom Port Probe - used to test a specific TCP port 
> number after entering it into the blank.
> Lookup Specific Port Information - used to lookup data about what 
> certain port numbers are commonly used for.
>
> Here are other resources that Steve provides relative to the UPNP 
> problem so you can research it:
>
> https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf 
>
> http://toor.do/DEFCON-19-Garcia-UPnP-Mapping-WP.pdf
> http://www.upnp-hacks.org/upnp.html
> http://toor.do/upnp.html
> http://www.h-online.com/security/news/item/Millions-of-devices-vulnerable-via-UPnP-Update-1794032.html 
>
>
> I recommend that you test your internet facing IPv4 addresses for UPNP 
> vulnerability immediately.  If your router responds to the external 
> UPNP inquiry, I suggest turning off UPNP from its control panel and 
> retesting.  If it still responds, consider upgrading the firmware and 
> retesting, or removing and replacing the router.
>
> I hope you find this information useful.
>
> Sincerely,
>
> Ron
>
>


-- 
Jay Lozier
jslozier at gmail.com



More information about the Ale mailing list