back to article Vulnerability leaves Cisco small biz routers wide open to attack

A number of Cisco networking products for small businesses contain critical vulnerabilities that could allow attackers to gain root access to the equipment, the networking giant has warned. The affected products include the WAP4410N Wireless-N Access Point, the WRVS4400N Wireless-N Gigabit Security Router, and the RVS4000 4- …

COMMENTS

This topic is closed for new posts.
  1. baguar

    It looks like El Reg's young Mr Chirgwin is upsetting people :)

    https://github.com/elvanderb/TCP-32764/blob/master/an_open_letter_to_journalists.md

    1. RealFred

      And so he should. Journalists are paid to write stories from information they are given. He gave the journalist enough information to write the story. He shouldn't have to spoon feed them or bow and curtsy to them. The world doesn't owe journalists a living, they after all, should be just reporting facts.

      1. Sanctimonious Prick

        "cross their fingers"

        Stop using their hardware.

        FIFY :D

      2. Phil O'Sophical Silver badge

        He gave the journalist enough information to write the story.

        I have to say that, having seen his "oh aren't I such a clever dick" slides, the hacker does come across as a somewhat juvenile tit. There are ways to write a report to get taken seriously, this isn't one of them.

    2. Anonymous Coward
      Anonymous Coward

      owned

      Nsa already own your data if you use a Cisco, thanks to Cisco installing back doors for them, knowing this, you should get sacked if you install Cisco in someone else's business. This is a bonus, great stuff.

  2. Anonymous Coward
    Anonymous Coward

    Undocumented test interface ? WTF!

    Let's just call it backdoor, OK?. Now let's figure out if it is plain stupidity or a favor to a 3 letter US agency. It has been a long time since Cisco managed to get rid of back-doors in their products so my vote goes to the second alternative. Shame on you, Cisco!

    1. Wzrd1 Silver badge

      Re: Undocumented test interface ? WTF!

      Let's use some critical thinking here.

      So, is the NSA interested in millions of small businesses around the world?

      That is what product line is impacted, small business networking products for mom and pop shops, small insurance agencies and similar small businesses.

      Really, now, do you honestly think that the NSA gives a tinker's damn about them over, perhaps, Fortune 100 companies or even better, Fortune 500? Or even better, every broadband provider, where they can slurp down all traffic to their heart's content?

      Even better, try Hanlon's Razor.

      1. Anonymous Coward
        Anonymous Coward

        Re: Undocumented test interface ? WTF!

        Yes I'd bet it is the NSA backdoor, and yes the NSA are very interested in all. Everyone. Especially small connections. There numerous scripts will already have been installing things behind the routers, so will the Chinese of course. Nothing to worry about.

        1. Anonymous Coward
          Anonymous Coward

          Re: Undocumented test interface ? WTF!

          Do you really think that the NSA and Cisco are so stupid as to to have a backdoor that you simply telnet to?

          A backdoor is supposed to be hidden and protected so that only those in the know can access it. Whilst the NSA might like access to your router they do not want others having the same ability.

          This is simply some internal development test code that has been left in the production build by mistake.

      2. Anonymous Coward
        Black Helicopters

        Re: So, is the NSA interested in millions of small businesses around the world?

        Of course they are.

        Their model is to bug everyone. Then they (or their super computers) look to see who is actually worth their individual human attention.

  3. Anonymous Coward
    Unhappy

    Cisco is not alone here

    This is part of a broader vulnerability for TCP-32764. It is conjectured that it was put in place by one, or more, SerComm engineers to allow resetting the devices that used their devices during the testing process in case the router locked up. Again, conjecture. The researcher that identified it has a PoC at GitHub: https://github.com/elvanderb/TCP-32764 . I'd include the suspect devices list except that link blows up here when placed in this reply.

    Turns out that the Arris device used by ComCast routers here has the vuln. so it just isn't business, even just SMBs. It's a very popular device.

  4. This post has been deleted by its author

This topic is closed for new posts.

Other stories you might like