Feeds

EE BrightBox routers can be hacked 'by simple copy/paste operation'

WPA keys, ISP creds, MD5 hashes - all in plain view

Providing a secure and efficient Helpdesk

BrightBox routers supplied by UK telco EE as standard kit to its broadband and fibre customers are riddled with security shortcomings that make the devices hackable, a UK security researcher warns.

Scott Helme warns that security vulnerabilities expose WPA encryption keys, passwords and ISP user credentials. Hackers might also have the ability to change a router's DNS settings in order to intercept a target's internet traffic.

A cache of sensitive traffic including ISP user credentials, WiFi SSIDs and WPA2 keys is kept in a file called cgi_status.js that can be accessed without logging into the device.

"The vulnerability allows for a complete bypass of the administrative login and total disclosure of all settings, passwords, configuration and credentials stored on the device," Helme told El Reg.

"Security appears not to be a factor in the design of the device. it appears to be a case of only making it functional," he added.

The security shortcomings of home networking kit have been much in the news of late and this prompted Helme to take a close look at the BrightBox router he received when he signed up to a broadband contract with EE. What he subsequently found led him to believe the kit had not been put through a proper security evaluation prior to its release.

"Once a user has access to your 'Guest Network' for example, they could simply view the WPA key for your 'Main Network' and completely bypass all of your restrictions with a simple copy/paste operation,” Helme warns. "Not only that, but if someone has brief access to your premises and perhaps connects to your LAN, they can steal a copy of your WiFi password/s. This would allow them remote access to your WiFi from outside the premises without you ever divulging the passwords to anyone."

Access to the ISP user credentials might be abused to hijack a target's broadband account. Access to the device admin password's MD5 hashes creates a means for hackers to crack the credential using a brute force attack and rainbow tables before changing the admin password, successfully commandeering the device in the process.

The vulnerabilities lend themselves to remote exploitation as the result of a cross-site reference forgery flaw involving the BrightBox routers, which Helme estimates is used by more than 700,000 customers in the UK. The same kit was previously supplied to Orange subscribers.

"Being able to grab details like the WPA keys or the hash of my admin passwords was bad enough, but exposing my ISP user credentials represents a huge risk," Helme concludes. "This is made even worse by the fact it’s possible to access all of the data remotely. Even if the device is only used in the home or small office, this represents a total compromise of the device’s security and an attacker could wreak havoc with your account causing huge inconvenience and even financial losses."

After looking into the software, Helme physically open up the router and probed its internal components in order to access the underlying operating system. Having done with the device he decided to physically destroy it using a shotgun. The video of the router's demise is at the bottom of this article.

Helme reported his research to EE back in November before going public with his findings last week. El Reg invited EE and device manufacturer Arcadyan to comment on the research.

In response, EE issued a statement on Friday promising to release a software update, while downplaying the severity of the security issues highlighted by Helme.

We are aware of Mr Helme's article. As is the case for all home broadband customers, regardless of their provider, it is recommend they only give network access to people they trust. Customers should also be suspicious of any unsolicited emails and web pages, and keep their security software up to date.

We treat all security matters seriously and while no personal data will be compromised by the device itself, we would like to reassure customers that we are working on a service update which we plan to issue shortly, and which will remotely and automatically update customers’ Brightboxes with enhanced security protection.

Helme responded to the statement by arguing that there are multiple levels of trust but EE has not acknowledged this and put too much onus on consumers.

"You might give a friend or someone else your Wi-Fi password but you wouldn't want to give them access to the admin account – but that's what EE is doing here," Helme said. He added that the multiple security shortcomings he identified with the device might all be resolved with a firmware update. ®

The router disintegrates as Scott Helme fires his shotgun at it.

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.