Weekly Comments

16 - 23 October 2018

This week, we received several reports about router vulnerabilities.
This week, we received several reports about router vulnerabilities. Some of Linksys’s E series wireless routers were found to contain vulnerabilities (CVE-2018-3953, CVE-2018-3954, CVE-2018-3955) that could allow an attacker to hijack the devices via an authenticated HTTP request sent to the network configuration and perform malicious activities such as taking control of devices and installing malware. The affected routers have reached end-of-life status, though they may still be sold by third-party resellers and distributors.

Researchers also found vulnerabilities (CVE-2018-10822, CVE-2018-10824, CVE-201810823) in eight D-Link models that could give an attacker full control over the devices. The vulnerabilities consist of a path traversal security gap that allows an attacker to read arbitrary files, passwords stored in plain text, and a shell command injection that enables an authenticated attacker to execute arbitrary code. Six of the eight models have reached end-of-life status.

Hackers are constantly hunting for routers with outdated firmware and weak passwords. They then compromise vulnerable routers and use them to carry out cyberattacks. To avoid having their routers compromised by hackers, we advise users to regularly update the firmware of their routers to the latest versions released by manufacturers. We also encourage users to adopt strong and unpredictable passwords that consist of a mix of upper- and lower-case letters, numbers, and symbols. 

[1] Some Linksys wireless routers found to contain vulnerabilities, warns SingCERT
[2] Bug Trio Affecting Eight D-Link Models Leads to Full Compromise

More Weekly Cyber Newsanalysis and insights

Ensign Consulting

Enhancing your security posture, developing your cyber strategy, and designing your incident response plans.​

Ensign Systems Integration

Architecting and implementing cybersecurity solutions that bolster defences

Ensign Managed Security Services

Managing your security operations for advanced threat detection, continuous monitoring, and triage services

Ensign Labs

Performing deep research to analyse vulnerabilities, deploy advanced threat hunting and provide cyber threat intelligence