1 min read

Most Current Routers Use EOL Linux Kernel and Are Chock Full of Vulnerabilities

Silviu STAHIE

July 07, 2020

Most Current Routers Use EOL Linux Kernel and Are Chock Full of Vulnerabilities

A study from the Fraunhofer Institute for Communication (FKIE) looked at 127 routers from known brands and found that most of them run really old operating systems riddled with security vulnerabilities.

It’s difficult to find a more prominent member of the Internet of Things (IoT) ecosystem than the Internet router. It’s a ubiquitous device that’s in every home, and it usually guards the access to a host of other IoT devices, making it all the more important.

Researchers analyzed 127 routers from seven vendors, including AVM, ASUS, Netgear, D-Link, Linksys, TP-Link and Zyxel. They managed to fully extract 117 of the 127 firmware images; four images were extracted partially, and six couldn’t be extracted at all. 91% of all routers were powered by Linux.

The study looked at a few metrics, such as when the devices were updated, which operating systems were used, mitigation techniques employed by vendors, and any hard-coded credentials.

The results of the investigation are seriously worrying. Out of the 127 routers, 45 had no updates in the past year, and many are affected by hundreds of vulnerabilities. Twenty-two routers didn’t get an update in the past two years and, in at least one case, a router didn’t get a single update in the past five years.

“Even if the routers got recent updates, many of these known vulnerabilities were not fixed,” said the researchers. “What makes matters even worse is that exploit mitigation techniques are used rarely. Some routers have easy crackable or even well-known passwords that cannot be changed by the user. Most firmware images provide private cryptographic key material.”

Most of the routers are based on a branch of Linux Kernel 2.6, which reached end of life in February 2016. And, lastly, it turns out that, despite the dangers of malware such as Mirai, which was designed to use hardcoded credentials, some vendors continue to use them.

tags


Author



Right now

Top posts

Ultimate Privacy Guide for Your Facebook Account

Ultimate Privacy Guide for Your Facebook Account

August 31, 2021

6 min read
7 Signs It’s Time to Use Parental Controls On Your Family’s Devices

7 Signs It’s Time to Use Parental Controls On Your Family’s Devices

August 27, 2021

2 min read
Your Netflix Account May Be on Sale on Darkweb. Protect It

Your Netflix Account May Be on Sale on Darkweb. Protect It

August 13, 2021

3 min read
E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

E-mails claiming your computer was hacked and your privacy exposed - what you need to know (spoiler: you can relax - they’re bluffing)

July 29, 2021

5 min read
Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

Watch Out for These Ongoing Bank of America Phishing Campaigns Targeting Customers in the US

July 16, 2021

3 min read
How to protect yourself against cyberstalking

How to protect yourself against cyberstalking

July 06, 2021

2 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Google Prepares to Reset App Permissions on Billions of Devices Google Prepares to Reset App Permissions on Billions of Devices
Silviu STAHIE

September 20, 2021

1 min read
Sideloading Android Apps - Bane or Blessing for Android Users Sideloading Android Apps - Bane or Blessing for Android Users
Silviu STAHIE

September 20, 2021

2 min read
FTC Says Companies Operating Health Apps and Connected Devices Must Inform Users of Data Breaches FTC Says Companies Operating Health Apps and Connected Devices Must Inform Users of Data Breaches
Silviu STAHIE

September 17, 2021

1 min read