Well-known manufacturers of residential and SME wireless routers will have reason to feel nervous as hackers at the annual DefCon security conference aim to break into their products to find undocumented vulnerabilities or so-called zero days.
The sponsors behind the DefCon SOHOpelessly Broken competition, Independent Security Evalutators and digital rights lobby group Electronic Frontier Foundation, are confident the hackers will find vulnerabilities, as a number of router vendors have been accused of carelessness in security in the past.
A study by ISE of 13 SOHO (small office/home office) routers found all to be vulnerable in one form or other. Of the routers in the study, 11 could be taken over remotely, and in two cases, no active management session was required.
ISE and EFF hope to create awareness of what they said is poor security across billions of SOHO devices around the world..
Despite abundant research and evidence that SOHO devices are highly vulnerable to malicious compromise, the vulnerable trends continue. From shotty code to blatant backdoors, the excitement never seems to end — though we'd like it to. Our hope is that this contest sheds light on the need for manufacturers to better secure these devices by shining a spotlight on them.
- SOHOpelessly Broken motivation statement.
Routers from Linksys, ASUS, TRENDnet, Netgear, TP-Link, D-Link and Belkin will be used for the competition, each with a specific firmware version. In addition, EFF's forthcoming Open Wireless Router could also be at the hackers' mercy.
A top score of 5000 points will be awarded for obtaining full control of the router, with a partial take-over rewarded with 4000 points. Points are deducted if the zero day is not a remote attack, requires human interaction, passwords or authenticated sessions among other things.
SOHOpelessly Broken adheres to a strict responsible disclosure policy, and affected vendors will be notified of vulnerabilities prior to these being demonstrated.