According to a recently published research paper, millions of devices making use of UPnP protocols are running a serious security risk.
TTJ Poll

After Note 7 Disaster what are your thoughts on Samsung Mobile?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)

Universal Plug n Play networking protocols are often used by organizations to allow devices to connect with each other within a network. However, a new research paper reveals, these protocols are highly insecure and can be used by hackers to exploit the millions of devices that make use of UPnP.

Digital security

UPnP networking protocols are used worldwide in a whole range of devices, including routers and other networking equipment. They are often deployed by organizations because it is easier to use them and the networking costs are significantly trimmed.

However, this convenience may come at a heavy price because UPnP has some serious security flaws. The UPnP discovery protocol, namely SSDP, can be used by a hacker to execute nefarious code as well as gain access to the UPnP control interface, even on a private network. To top things up, certain UPnP protocols provide access to such device functions which are not even mandated as per security regulations.

The worst part is that nearly 80 million devices making use of UPnP protocols can be discovered via internet. This gives a potential hacker a huge repository of at-risk devices, which he can then exploit at his leisure.

According to the paper, “In most cases, network equipment that is “no longer shipping” will not be updated at all, exposing these users to remote compromise until UPnP is disabled or the product is swapped for something new. The flaws identified in the MiniUPnP software were fixed over two years ago, yet over 330 products are still using older versions.”

The discovery is certainly frightening in its sheer scope and gives food for thought to organizations who tend to take the security of their internal networks lightly.

Network security

Source: Security Flaws in Universal Plug and Play: Unplug, Don’t Play

Courtesy: CNET

Buy Cheapest Related Product From

Twitter Runs Into Over Capacity Issues

Valve Considers Apple The Biggest Threat To The Console Market
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On February 1, 2013(3 years, 8 months ago.)

You May Also Like:

What Do You Think?

Leave a Reply

Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.

Recent Search

Recent Tutorials

There is a high-risk XSS Vulnerability in W3 Total Cache, and we have got the guide to the fix for you.
Check out this tutorial to know how to install Apple watchOS 3 beta certificate on your Apple Watch and start enjoying the new version.
If you are trying to jailbreak iPhone, iPad or iPod on iOS 9.2 - 9.3.3 without using a computer or Apple ID, then check this video tutorial.
Pokemon Go users are complaining about the crashing and server issues. Check out the tutorial to solve error problems and thanks us later.
Turning off Wi-Fi Assist is a great way to save mobile data since it automatically starts using cellular data when Wi-Fi signal is poor .
If you want to secure your SIM card from others using it, then check out this tutorial to know how to set up the SIM Pin code on your iPhone.
CiderTV is a great alternative to control Apple TV from the Notification Center. Check out this tutorial to set up CiderTV on your iPhone.
Are you annoyed by the split screen mode on the iPhone 6 Plus or 6s Plus? Check out this quick tutorial to turn off split screen feature.
If you could not wait to installed the iOS 10 beta version on you iPhone and now struggling for the errors, then this tutorial is for you.
Siri might not understand the question you asked. But you can use Siri by editing the text that you asked & it will give an updated answer.
Close You Have To Login
Login With »Login With TwitterLogin With Facebook