Research
Hackers welcome: Major security test uncovers vulnerabilities in all common Wi-Fi routers
Dec 1, 2021
3
min read
TablE of contents
- IoT Inspector and CHIP examine devices from AVM, Asus, Netgear, and more
- New German coalition announces manufacturer liability for damages caused by IT security vulnerabilities
Manufacturers have responded - so have policymakers
All of the affected manufacturers were contacted by the test team and given the opportunity to respond. Without exception, all responded with more or less intensively prepared firmware patches, which users of the affected routers should now urgently apply, in case the automatic update function is not already activated. “Following our test, the affected manufacturers have already patched a lot of security gaps in their devices. But Wi-Fi routers are still not flawless. Manufacturers still have some catching up to do," says CHIP author Jörg Geiger. At the same time, the coalition agreement of the new German government announces that manufacturers will be required to take greater accountability in the future. It states that "manufacturers are liable for damage negligently caused by IT security vulnerabilities in their products." This increases the pressure on the industry to continuously secure products in order to avoid immense claims for damages. IoT Inspector's firmware security checks automate this important step of analysis. All it takes is to upload a device's firmware to iot-inspector.com. Within minutes, the platform generates a detailed report and risk rating of the detected vulnerabilities, which can then be addressed in a targeted manner.Typical problems with all manufacturers
Some of the security issues were detected more than once. Very frequently, an outdated operating system, i.e. Linux kernel, is in use. Since the integration of a new kernel into the firmware is costly, no manufacturer was up to date here. The device software used is also commonly found to be outdated, as it all too often relies on standard tools like BusyBox. Additional services that the devices offer besides routing - such as multimedia functions or VPN – tend to be outdated as well. In fact, a large number of manufacturers use default passwords like "admin", which in many cases can be read in plain text. "Changing passwords on first use and enabling the automatic update function must be standard practice on all IoT devices, whether the device is used at home or in a corporate network. The greatest danger, besides vulnerabilities introduced by manufacturers, is using an IoT device according to the motto 'plug, play and forget'," warns IoT Inspector’s CEO Jan Wendenburg. The full report can be read here (in German). The IoT Inspector Research Lab also published a detailed technical write-up on how they extracted an encryption key for a subset of D-Link routers during the research process.About Onekey
ONEKEY is the leading European specialist in Product Cybersecurity & Compliance Management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC). The unique combination of an automated Product Cybersecurity & Compliance Platform (PCCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life.
CONTACT:
Sara Fortmann
Marketing Manager
sara.fortmann@onekey.com
euromarcom public relations GmbH
+49 611 973 150
team@euromarcom.de
Ready to automate your Product Cybersecurity & Compliance?
Make cybersecurity and compliance efficient and effective with ONEKEY.