U.S. CERT advises consumers and businesses to disable networking protocol that permits many electronics to discover each other on a network Manufacturers are being blamed for the security risks customers face from major flaws in the implementation of the UPnP standard that leaves tens of millions of network-enabled devices open to cyberattacks.Security vendor Rapid7, which released a white paper on the vulnerabilities on Tuesday, says manufacturers do a miserable job at releasing timely firmware updates to fix security problems. Manufacturers whose products are affected by the UPnP vulnerabilities include Cisco-owned Linksys, Netgear, Belkin and D-Link.“You have to keep in mind their business model. These are companies that make their money by every six months based on shipping their next round of devices,” said HD Moore, chief security officer for Rapid7. “After two or three years from the first time they launched the device, it’s really not worth the time or effort to maintain firmware updates for it.”Netgear declined to comment, while Belkin and D-Link did not respond to emails. Linksys said it was aware of the problem and advised customers to go to its website to find out whether their home router was affected and to learn hot to disable UPnP. UPnP is a set of networking protocols that permits many consumer electronics to discover each other on a network. At that point, the devices can establish network services for data sharing, communication, media streaming and media playback control.The protocols are designed for use in closed home networks. However, a misconfiguration of the UPnP protocol exposed many wireless routers, printers, media servers, IP cameras and smart TVs to cyberattacks, Rapid7 said. A scan of the Internet from June to November last year found more than 80 million devices that responded to UPnP discovery requests, Rapid7 said. Tens of millions of the devices were susceptible to cyberattack as a result of any one of several vulnerabilities.[In depth: Seven dealy sins of home office security]In general, device manufacturers change hardware in products whenever they find cheaper components. At the same time, they only support product configurations that they are currently shipping, Moore said. As a result, products seldom get maintenance support for longer than one or two years, leaving it up to users to search for firmware updates, if they are even available.“For the most part, once the device has been out there for a year or two, the vendor stops maintaining it, with some exception for devices that are more popular than others,” Moore said. “I was talking to a vendor yesterday that said, ‘If we’re not shipping it; we’re not supporting it.'”The UPnP problem affects primarily consumers and small businesses, which are the primary buyers of the products. One way to prevent exposure to attackers is to find the configuration tools that ship with the device and manually disable UPnP.A more comprehensive solution would be to have Internet service providers block the port used by UPnP to discover devices over the Internet. However, ISPs are unlikely to take such a step without pressure from customers. On Tuesday, the U.S. Computer Emergency Readiness Team, part of the Department of Homeland Security, advised consumers and businesses to disable UPnP.Device manufacturers have been criticized before for failing to quickly patch vulnerabilities. Makers of Android tablets and smartphones are notoriously slow at distributing updates of the Google mobile platform. As a result, Android has become a primary target for mobile malware. Related content opinion Preparing for the post-quantum cryptography environment today It’s a mistake to put off the creation of precautions against quantum threats, no matter how far in the future you might think quantum computing will become a reality. By Christopher Burgess Sep 26, 2023 5 mins CSO and CISO Encryption Threat and Vulnerability Management feature What is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management? By Matthew Tyson Sep 26, 2023 12 mins Cryptocurrency Cryptocurrency Cryptocurrency news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Government Incident Response news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe