{"id":7035,"date":"2017-03-19T18:31:16","date_gmt":"2017-03-20T02:31:16","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/19\/news-826\/"},"modified":"2017-03-19T18:31:16","modified_gmt":"2017-03-20T02:31:16","slug":"news-826","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/19\/news-826\/","title":{"rendered":"Ubiquiti called out for security flaw"},"content":{"rendered":"<p><strong>Credit to Author: Michael Horowitz| Date: Sun, 19 Mar 2017 18:48:00 -0700<\/strong><\/p>\n<p>When it comes to evaluating networking devices (routers, Access Points, switches), almost everyone focuses on the hardware. Not me. My <a href=\"http:\/\/routersecurity.org\">RouterSecurity.org<\/a> site is devoted to software.<\/p>\n<p>But, there is yet another crucial aspect to evaluating devices &#8211; the personality of the company behind it. Specifically, how it reacts to the inevitable software flaws.<\/p>\n<p>At the end of 2016 assorted bugs in Netgear routers were made far worse by the company&#8217;s slow reaction. Now, Netgear has a whole new procedure for dealing with bug reports. Time will tell how well it works.<\/p>\n<p>This week, the focus is on Ubiquiti Networks. Over at SmallNetBuilder.com,\u00a0Tim Higgins just <a href=\"https:\/\/www.smallnetbuilder.com\/wireless\/wireless-reviews\/33084-ubiquiti-ac-pro-and-ac-lite-access-points-reviewed\">reviewed their latest access points<\/a>\u00a0and started off the review pointing out how popular Ubiquiti access points are with the Ars Technica crowd.\u00a0<\/p>\n<p>But, a Vienna, Austria-based security firm, <a href=\"https:\/\/www.sec-consult.com\">SEC Consult<\/a>, which has <a href=\"https:\/\/www.sec-consult.com\/fxdata\/seccons\/prod\/temedia\/advisories_txt\/20150519-0_KCodes_NetUSB_Kernel_Stack_Buffer_Overflow_v10.txt\">reported router flaws<\/a> in the past, just reported a <a href=\"http:\/\/www.itworld.com\/article\/3181832\/security\/unpatched-vulnerability-puts-ubiquiti-networking-products-at-risk.html\">bug in 4 Ubiquiti devices<\/a>. They believe the bug also exists in another 38 devices.\u00a0<\/p>\n<p>The flaw, in <code>pingtest_action.cgi<\/code>, allows authenticated users to inject arbitrary commands into the web interface. It&#8217;s not a brutally critical thing.\u00a0<\/p>\n<p>The most interesting aspect of the <a href=\"https:\/\/www.sec-consult.com\/fxdata\/seccons\/prod\/temedia\/advisories_txt\/20170316-0_Ubiquiti_Networks_authenticated_command_injection_v10.txt\">Security Advisory<\/a>, to me, was the &#8220;Vendor contact timeline.&#8221;\u00a0Below is an incomplete and edited copy of it.\u00a0<\/p>\n<p><span style=\"text-decoration: underline;\">VENDOR CONTACT TIMELINE<\/span><br \/>Nov 22, 2016: Initial bug report <br \/>Nov 22, 2016: Ubiquiti considers the bug a duplicate of bug #143447<br \/>Nov 25, 2016: Ubiquiti says that bug #143447 should be fixed in the next firmware release <br \/>Jan 10, 2017: SEC Consult asks for a patch. No answer.<br \/>Jan 17, 2017: SEC Consult asks for an update. Ubiquiti says the Proof of Concept hack does not work.<br \/>Jan 18, 2017: SEC Consult explains their Proof of Concept again<br \/>Jan 19, 2017: Ubiquiti says they received a similar report and assumed a duplication. They tell SEC Consult that the Proof of Concept never worked\u00a0and did not make any sense.<br \/>Jan 20, 2017: SEC Consult uploads a video showing command injection on an up-to-date device <br \/>Jan 21, 2017: Ubiquiti responds that they were able to reproduce the problem. They also posted the real cause.<br \/>Jan 24, 2017: SEC Consult asks whether the vulnerability is a duplicate of #143447<br \/>Jan 24, 2017: Ubiquiti says it is not and that this issue will be fixed as soon as possible.<br \/>Feb 3, 2017: SEC Consult asks for a status update. No answer.<br \/>Feb 21, 2017: SEC Consult asks for a status update. No answer.<br \/>March 1, 2017: SEC Consult tells Ubiquiti that they will go public with the flaw in two weeks. No answer.<br \/>March 16, 2017: SEC Consult goes public\u00a0<\/p>\n<p>Four months, no bug fix.<\/p>\n<p>Back in November, Lucian Constantin of IDG, the same reporter who just wrote about the Ubiquiti flaw, had a <a href=\"http:\/\/www.pcworld.com\/article\/3140627\/security\/hacker-shows-how-easy-it-is-to-take-over-a-citys-public-wi-fi-network.html\">story in PC World<\/a> about a flaw in a router from my favorite router vendor, <a href=\"http:\/\/peplink.com\">Peplink<\/a>.<\/p>\n<p>The two cases could not be more different.<\/p>\n<p>Constantin reported that the person who reported the flaw &#8220;was impressed with how Peplink responded to his report and how the company handled the vulnerability.&#8221; A <a href=\"http:\/\/motherboard.vice.com\/read\/a-hacker-took-over-tel-avivs-public-wi-fi-network-to-prove-that-he-could\">Motherboard article<\/a> said basically the same thing and added that Peplink gave the person who reported the flaw a free router as a gesture of good will.\u00a0<\/p>\n<p>No one expects software to be perfect. I have run into a couple software problems with the Peplink routers I maintain. But reporting the problems was easy and the assistance from tech support was all that anyone could hope for.<\/p>\n<p>That&#8217;s what you want in a vendor.\u00a0<\/p>\n<p>Personally, I use and recommend the <a href=\"http:\/\/routersecurity.org\/pepwavesurfsofo.php\">Pepwave Surf SOHO<\/a>. It&#8217;s the cheapest router Peplink offers. How fast is the Wi-Fi? I haven&#8217;t tested it. What&#8217;s the Wi-Fi range? I don&#8217;t care. Can it handle a 200 Mbps connection to the Internet? No. Is it dual-band? Mine is not (new ones are). Can the USB port be used for file sharing? No. How <a href=\"http:\/\/routersecurity.org\/checklist.php\">secure is it<\/a>? <em>Much<\/em> more than your router.\u00a0<\/p>\n<p>&#8211; &#8211; &#8211; &#8211; &#8211;\u00a0<\/p>\n<p>Now that Computerworld, and all of parent company IDG&#8217;s websites, have eliminated user comments, you can get in touch with me privately by email at my full name at Gmail. Public comments can be directed to me on twitter at @defensivecomput<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3182433\/security\/ubiquiti-called-out-for-security-flaw.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Michael Horowitz| Date: Sun, 19 Mar 2017 18:48:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>When it comes to evaluating networking devices (routers, Access Points, switches), almost everyone focuses on the hardware. Not me. My <a href=\"http:\/\/routersecurity.org\">RouterSecurity.org<\/a> site is devoted to software.<\/p>\n<p>But, there is yet another crucial aspect to evaluating devices &#8211; the personality of the company behind it. Specifically, how it reacts to the inevitable software flaws.<\/p>\n<p>At the end of 2016 assorted bugs in Netgear routers were made far worse by the company&#8217;s slow reaction. Now, Netgear has a whole new procedure for dealing with bug reports. Time will tell how well it works.<\/p>\n<p>This week, the focus is on Ubiquiti Networks. Over at SmallNetBuilder.com,\u00a0Tim Higgins just <a href=\"https:\/\/www.smallnetbuilder.com\/wireless\/wireless-reviews\/33084-ubiquiti-ac-pro-and-ac-lite-access-points-reviewed\">reviewed their latest access points<\/a>\u00a0and started off the review pointing out how popular Ubiquiti access points are with the Ars Technica crowd.\u00a0<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3182433\/security\/ubiquiti-called-out-for-security-flaw.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714],"class_list":["post-7035","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7035"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7035\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7035"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}