Sunday, February 26, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
MWC: HP Announces The Pro x2 612 G2 Commercial Detachable
HMD Brings Nokia's Classic 3310 Phone Back
MWC: Samsung Launches The Galaxy Tab S3, Galaxy Book, And New Gear VR With Controller
New Budget-friendly Moto G5 and G5 Plus Come With Metal Designs
DJI Introduces M200 Series Drones For Enterprise Solutions
MWC: ZTE Unveils The'Gigabit' Proof-of-concept Smartphone
MWC: Huawei Launches New HUAWEI P10 and P10+ Smartphones, Watch 2 Smartwatches
Samsung to Showcase Galaxy Tab S3 and Galaxy Book 2 Tablets, A New Gear VR at MWC
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Homelan...
Last 7 Days News : SU MO TU WE TH FR SA All News

Tuesday, January 29, 2013
Homeland Security Says UPnP Poses Risks


The U.S. government is warning to disable UPnP, a common networking feature, after bugs have left millions of hardware devices vulnerable to attacks by hackers and malware.

The Department of Homeland Security urged computer users on Tuesday to disable Universal Plug and Play (UPnP), a set of network protocols designed to support automatic discovery and service configuration.

The security bugs were initially brought to the attention of the government by computer security company Rapid7, in Boston, which released a report on the problem on Tuesday. The company said it discovered between 40 million and 50 million devices that were vulnerable to attack due to problems that the firm's researchers have identified with the UPnP standard.

According to Rapid7, the two most commonly used UPnP software libraries both contained remotely exploitable vulnerabilities. In the case of the Portable UPnP SDK, over 23 million IPs are vulnerable to remote code execution through a single UDP packet. The company identified over 6,900 product versions that were vulnerable through UPnP. This list encompasses over 1,500 vendors.

The vulnerabilities Rapid7 identified in the Portable UPnP SDK have been fixed as of version 1.6.18 (released today), but it will take a long time before each of the application and device vendors incorporate this patch into their products.

The flaws could allow hackers to access files, steal passwords, take full control over PCs as well as remotely access devices such as webcams, printers and security systems.

Rapid7 has released a free tool that can identify exposed UPnP endpoints in your network and flag which of those may remotely exploitable through recently discovered vulnerabilities.


Previous
Next
BlackBerry 10: RIM's Last Hope To Apple And Samsung        All News        Get Ready For Crysis 3 beta With New AMD Catalyst Drivers
LG Reports Revenue Decrease, Operating Profits For 2012     General Computing News      Microsoft Releases Office 365 Home Premium

Get RSS feed Easy Print E-Mail this Message

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .