sfx2000
Part of the Furniture
Seeing chatter on the threads where folks are suspecting their Asus routers may be compromised...
From SecurityFocus/Bugtrak - this is from the 2013 incident, but bodes well today...
I would add ensure that WAN facing SSH/Telnet be disabled for the the moment, pending outcome of investigation by Asus and the Third Party community.
As additional steps - use the WebGUI sparingly - log in to check status/make changes, but then logout and Quit the Browser - additionally, when using the WebGUI. I would be careful not to have other Windows/Tabs open in the same browser.
I would even go as far as removing any external USB shared devices for now, and ensuring that SMB/FTP/AFP/NFS services are turned off.
Might also consider Entware/Optware packages - if not absolutely needed, it's not recommended to have them on board...
Please, be safe out there!
From SecurityFocus/Bugtrak - this is from the 2013 incident, but bodes well today...
Mitigation and temporary fixes:
- Users need to be alerted to turn off AiCloud service immediately
- All Web access to both the http and https need to be halted until proven safe
- UPnP services need to be turned off
- Disable FTP and Samba services until the problem is fully understood/patched if possible
- Enable the built in firewall, change authentication to be MD5 hashed
- CHANGE THE DEFAULT USERNAME AND PASSWORD!!!!
- End Users should try to avoid using the default gateway of 192.168.1.1 and pick something unusual
- Turn off IPSEC, PPTP and the other NAT passthroughs if the VPN is not explicitly being utilized
- Not clear if this is related to AsusWRT factory firmware only, or third parties are also impacted
- Users need to be alerted to turn off AiCloud service immediately
- All Web access to both the http and https need to be halted until proven safe
- UPnP services need to be turned off
- Disable FTP and Samba services until the problem is fully understood/patched if possible
- Enable the built in firewall, change authentication to be MD5 hashed
- CHANGE THE DEFAULT USERNAME AND PASSWORD!!!!
- End Users should try to avoid using the default gateway of 192.168.1.1 and pick something unusual
- Turn off IPSEC, PPTP and the other NAT passthroughs if the VPN is not explicitly being utilized
- Not clear if this is related to AsusWRT factory firmware only, or third parties are also impacted
I would add ensure that WAN facing SSH/Telnet be disabled for the the moment, pending outcome of investigation by Asus and the Third Party community.
As additional steps - use the WebGUI sparingly - log in to check status/make changes, but then logout and Quit the Browser - additionally, when using the WebGUI. I would be careful not to have other Windows/Tabs open in the same browser.
I would even go as far as removing any external USB shared devices for now, and ensuring that SMB/FTP/AFP/NFS services are turned off.
Might also consider Entware/Optware packages - if not absolutely needed, it's not recommended to have them on board...
Please, be safe out there!
Last edited: