Remote zero-day hole found in Linksys routers

Powered by SC Magazine
 

Researchers say all routers likely affected.

A zero-day vulnerability has been discovered in popular Cisco Linksys routers that allows hackers to gain remote root access.

The hole affects default installations of Linksys routers and is demonstrated in a proof of concept video.

A zero day attack is one which exploits a previously unknown vulnerability. 

An exploit was successfully tested against a Linksys model WRT54GL router by researchers at security firm DefenseCode, who said other models "are probably also affected".

 Cisco claims to have sold more than 70 million Linksys routers globally.

DefenseCode said all firmware versions are vulnerable, and claimed Cisco incorrectly stated the hole was fixed in its latest firmware release.

"Due to the severity of this vulnerability, once again we would like to urge Cisco to fix this vulnerability," the security firm said in a statement.

A patch is due out this week, days ahead of DefenseCode's scheduled release of the full vulnerability details.

A spokesperson for Cisco/Linksys said the company "takes the security of our products and customers’ home networks very seriously.

"Although we can confirm contact with DefenseCode, we have no new vulnerability information related to our WRT54GL or other home routers to share with customers at this time," the spokesperson said. "We will continue to review new information that comes to light and will provide customer updates as appropriate."

Copyright © SC Magazine, Australia


Remote zero-day hole found in Linksys routers
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 313

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 118

Vote