Feeds

Buggy home routers expose O2 customers to hijacking

O2 looking in to it

5 things you didn’t know about cloud backup

Updated If you get your internet service from O2, there's a good chance Paul Mutton can remotely log in to your router and make configuration changes that surreptitiously allow him to access computers on your network.

That's because the UK-based ISP offers its customers free customized routers that are vulnerable to CSRF, or cross-site request forgery, attacks. Simply put, the hole allows him to log into the device using a simple web browser and a specially manipulated URL. Once connected, he can perform many if not all of the same administrative tasks an owner physically accessing the device can.

"This flaw allows remote attackers to take almost full control of the router, including stealing the wireless encryption key (even if the most advanced WPA2 setting was enabled) and forwarding external ports to internal IP addresses," Mutton, a security researcher located near the UK's Bath, wrote here.

The port-forwarding bit makes it easy easy for an attacker to intrude into a user's home network by burrowing into a computer, set-top box, or other device that would otherwise be protected by router's firewall. Interlopers can probably do other things, including changing the domain name system server to one that silently redirects users to rogue websites that masquerade as a legitimate bank, e-commerce site or search engine.

The flaw resides in two custom-built devices O2 gets from router manufacturer Thomson. Both the TG585n, and the TG585, known respectively as the O2 Wireless Box III and the O2 Wireless Box II, suffer from the bug. Subscribers of other ISPs that use the device are also likely to be exposed to the same threat.

An O2 spokesman said: "We have been notified of a potential security issue with the O2 Wireless box routers. We take this issue very seriously and are investigating it with the router manufacturer, Thomson. We thank Mr Mutton for bringing it to our attention."

Mutton said that's a far cry from the statements O2 support people gave him over the past week when he tried to bring the vulnerability to their attention. According to the blow-by-blow he provided, they told him the devices were "secured to a standard that is acceptable for home use" and that the provider was "under no obligation to supply you with a different router."

Routers and other low-cost devices that come with web interfaces have long been known to be vulnerable to a wide variety of attacks. Routers seem to be the low-hanging fruit, with bugs having been found in gear made by Linksys and Netgear and devices provided by BT on multiple occasions. ®

Update

On Thursday, O2 issued the following statement:

"Having been notified of a potential security issue with our O2 wireless box we have been working to find a solution. We have taken this issue very seriously and have been continuing to investigating it with the router’s manufacturer, Thomson.

"As a result we have identified a solution and we will be applying this remotely to all of our customers O2 wireless boxes. This means that customers will not have to take any action themselves."

Next gen security for virtualised datacentres

More from The Register

next story
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.