Users will have to connect to their router via Telnet and type “iptables -I INPUT -p udp -dport 9999 -j DROP” without the quotes on the command line interface. The simplest way to block potential exploits for this vulnerability is to create a firewall rule that blocks UDP port 9999 on the router, but unfortunately this cannot be done through the Web-based administration interface. Until Asus releases firmware updates for the affected routers, there are several mitigations available, although applying some of them requires technical skills. Among other things, they can strip SSL from secure traffic and use DNS hijacking techniques to misrepresent legitimate websites. A router compromise is much harder to detect than a PC infection, because there are no antivirus programs running on such devices.īy controlling routers attackers gain the ability to intercept, inspect and modify incoming and outgoing Internet traffic for all devices that connect through them. Routers are valuable targets for attackers, because they provide them with a foothold inside networks from where they can attack other devices. Any local computer infected with malware can therefore become a serious threat to a router that’s vulnerable to this attack. While attackers can’t exploit this flaw from the Internet, they can use it to gain control of routers if they first compromise a device connected to them or if they manage to connect to the local network in some other way. Drake published his findings after someone else independently found the same issue and released an exploit for it.
0 Comments
Leave a Reply. |