CyberInsecure.com

Daily cyber threats and internet security news: network security, online safety and latest security alerts
May 16th, 2009

D-Link Wireless Routers With New ‘Security Feature’ Are Susceptible To Network Intrusion

A new security feature added to some D-Link wireless routers actually makes users more susceptible to network intrusion, according to a hacker blog, which provides enough evidence to be taken seriously.

In response to the growing number of attacks and subsequent user security concerns, D-Link has integrated CAPTCHA – a system, designed to detect whether responses are human or computer-generated – into its popular home and small office routers as an extra safety measure. CAPTCHAs are used to prevent malicious software from performing actions that degrade the quality of service on a network, such as those found in worms, viruses and Trojan horses.

Manufacturer D-Link was still busy congratulating itself for adding a CAPTCHA designed to prevent malware bots from logging on to the devices when folks at the SourceSec Security Research blog showed how the upgrade could be manipulated to steal a WPA (or Wi-Fi protected access) password without even bothering to solve the test.

That’s because the new firmware logs in using a GET request containing a salted MD5 hash of the password, along with with input that’s unique to the CAPTHCHA image. It turns out all that’s required to access the router’s setup page is the hash, so the feature provides an easy way for anyone within range to access the panel that controls all kinds of sensitive settings and contains the WPA password.

What’s more, the new firmware allows even those with user-level access the ability to log in to the control panel, so an attacker need not have administrative credentials to perform the attack.

When we learned earlier this week that D-Link added the CAPTCHA to some of its home and office routers, we dismissed it as little more than a gimmick designed to lull inattentive consumers into a false sense of security. After all, it does nothing that couldn’t be achieved by taking 30 seconds to change the default password to a phrase that’s strong and unique.

Now we learn that it can actually make it easier for people within range to sneak into private sections of a network and uses the notoriously insecure MD5 hash to boot.

Credit: The Register

Share this item with others:

More on CyberInsecure:
  • D-Link Routers Vulnerability Mass Scans
  • Vulnerable DD-WRT Firmware Exposes Wireless Routers
  • New Zlob Trojan Version Alters Wireless Router Settings And Hijacks DNS
  • Service Cracks Wireless Passwords From The Cloud
  • PlayStation Network Investigates Intrusion, Down For Over 3 Days

  • If you found this information useful, consider linking to it from your own website.
    Just copy and paste the code below into your website (Ctrl+C to copy)
    It will look like this: D-Link Wireless Routers With New ‘Security Feature’ Are Susceptible To Network Intrusion

    Leave a Reply

    Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.

    *
    To prove you’re a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.