Feeds

EE BrightBox routers can be hacked 'by simple copy/paste operation'

WPA keys, ISP creds, MD5 hashes - all in plain view

Build a business case: developing custom apps

BrightBox routers supplied by UK telco EE as standard kit to its broadband and fibre customers are riddled with security shortcomings that make the devices hackable, a UK security researcher warns.

Scott Helme warns that security vulnerabilities expose WPA encryption keys, passwords and ISP user credentials. Hackers might also have the ability to change a router's DNS settings in order to intercept a target's internet traffic.

A cache of sensitive traffic including ISP user credentials, WiFi SSIDs and WPA2 keys is kept in a file called cgi_status.js that can be accessed without logging into the device.

"The vulnerability allows for a complete bypass of the administrative login and total disclosure of all settings, passwords, configuration and credentials stored on the device," Helme told El Reg.

"Security appears not to be a factor in the design of the device. it appears to be a case of only making it functional," he added.

The security shortcomings of home networking kit have been much in the news of late and this prompted Helme to take a close look at the BrightBox router he received when he signed up to a broadband contract with EE. What he subsequently found led him to believe the kit had not been put through a proper security evaluation prior to its release.

"Once a user has access to your 'Guest Network' for example, they could simply view the WPA key for your 'Main Network' and completely bypass all of your restrictions with a simple copy/paste operation,” Helme warns. "Not only that, but if someone has brief access to your premises and perhaps connects to your LAN, they can steal a copy of your WiFi password/s. This would allow them remote access to your WiFi from outside the premises without you ever divulging the passwords to anyone."

Access to the ISP user credentials might be abused to hijack a target's broadband account. Access to the device admin password's MD5 hashes creates a means for hackers to crack the credential using a brute force attack and rainbow tables before changing the admin password, successfully commandeering the device in the process.

The vulnerabilities lend themselves to remote exploitation as the result of a cross-site reference forgery flaw involving the BrightBox routers, which Helme estimates is used by more than 700,000 customers in the UK. The same kit was previously supplied to Orange subscribers.

"Being able to grab details like the WPA keys or the hash of my admin passwords was bad enough, but exposing my ISP user credentials represents a huge risk," Helme concludes. "This is made even worse by the fact it’s possible to access all of the data remotely. Even if the device is only used in the home or small office, this represents a total compromise of the device’s security and an attacker could wreak havoc with your account causing huge inconvenience and even financial losses."

After looking into the software, Helme physically open up the router and probed its internal components in order to access the underlying operating system. Having done with the device he decided to physically destroy it using a shotgun. The video of the router's demise is at the bottom of this article.

Helme reported his research to EE back in November before going public with his findings last week. El Reg invited EE and device manufacturer Arcadyan to comment on the research.

In response, EE issued a statement on Friday promising to release a software update, while downplaying the severity of the security issues highlighted by Helme.

We are aware of Mr Helme's article. As is the case for all home broadband customers, regardless of their provider, it is recommend they only give network access to people they trust. Customers should also be suspicious of any unsolicited emails and web pages, and keep their security software up to date.

We treat all security matters seriously and while no personal data will be compromised by the device itself, we would like to reassure customers that we are working on a service update which we plan to issue shortly, and which will remotely and automatically update customers’ Brightboxes with enhanced security protection.

Helme responded to the statement by arguing that there are multiple levels of trust but EE has not acknowledged this and put too much onus on consumers.

"You might give a friend or someone else your Wi-Fi password but you wouldn't want to give them access to the admin account – but that's what EE is doing here," Helme said. He added that the multiple security shortcomings he identified with the device might all be resolved with a firmware update. ®

The router disintegrates as Scott Helme fires his shotgun at it.

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?