Friday, December 09, 2016
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Samsung To Make Chips For Tesla Cars
Google Opens its Digital Assistant to Developers
BlackBerry Unveils BlackBerry Secure For IoT Mobile Security
ARM Physical IP for TSMC 7nm Process Technology Now Available
HTC Launches Vive Studios, Debuts "Arcade Saga" Title
Radeon Software Crimson ReLive Edition Brings Support For Chill, Along With New Features
Microsoft Unveils Windows 10 for Qualcomm Chips, "Project Evo" PCs For Mixed Reality And Gaming
Samsung's First Foldable Phone May Actually Not Have A Foldable Screen
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Homelan...
Last 7 Days News : SU MO TU WE TH FR SA All News

Tuesday, January 29, 2013
Homeland Security Says UPnP Poses Risks


The U.S. government is warning to disable UPnP, a common networking feature, after bugs have left millions of hardware devices vulnerable to attacks by hackers and malware.

The Department of Homeland Security urged computer users on Tuesday to disable Universal Plug and Play (UPnP), a set of network protocols designed to support automatic discovery and service configuration.

The security bugs were initially brought to the attention of the government by computer security company Rapid7, in Boston, which released a report on the problem on Tuesday. The company said it discovered between 40 million and 50 million devices that were vulnerable to attack due to problems that the firm's researchers have identified with the UPnP standard.

According to Rapid7, the two most commonly used UPnP software libraries both contained remotely exploitable vulnerabilities. In the case of the Portable UPnP SDK, over 23 million IPs are vulnerable to remote code execution through a single UDP packet. The company identified over 6,900 product versions that were vulnerable through UPnP. This list encompasses over 1,500 vendors.

The vulnerabilities Rapid7 identified in the Portable UPnP SDK have been fixed as of version 1.6.18 (released today), but it will take a long time before each of the application and device vendors incorporate this patch into their products.

The flaws could allow hackers to access files, steal passwords, take full control over PCs as well as remotely access devices such as webcams, printers and security systems.

Rapid7 has released a free tool that can identify exposed UPnP endpoints in your network and flag which of those may remotely exploitable through recently discovered vulnerabilities.


Previous
Next
BlackBerry 10: RIM's Last Hope To Apple And Samsung        All News        Get Ready For Crysis 3 beta With New AMD Catalyst Drivers
LG Reports Revenue Decrease, Operating Profits For 2012     General Computing News      Microsoft Releases Office 365 Home Premium

Get RSS feed Easy Print E-Mail this Message

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2016 - All rights reserved -
Privacy policy - Contact Us .