Americas

  • United States

Asia

Oceania

roger_grimes
Columnist

The Danger of UPnP routers

Analysis
Feb 19, 20062 mins
Data and Information SecuritySecurity

Universal Plug-n-Play routers are a security issue that end-users and administrators should be or become familiar with. I was listening to the latest Security Now! security pod cast (http://www.grc.com/securitynow.htm), as discussed in my latest InfoWorld column (http://www.infoworld.com/article/06/02/17/75431_08OPsecadvise_1.html), and heard Steve Gibson's concern about UPnP-enabled routers and firewalls. UPnP-

Universal Plug-n-Play routers are a security issue that end-users and administrators should be or become familiar with.

I was listening to the latest Security Now! security pod cast (http://www.grc.com/securitynow.htm), as discussed in my latest InfoWorld column (http://www.infoworld.com/article/06/02/17/75431_08OPsecadvise_1.html), and heard Steve Gibson’s concern about UPnP-enabled routers and firewalls.

UPnP-enabled network devices (normally home-based firewalls, routers, switches, cable modems, etc.) will automatically open up outbound and/or inbound network ports if requested by an UPnP-enabled application.

For instance, a user installs a P2P chat application. It can open up the necessary ports in a user’s host-based firewall or hardware network device in order to allow it’s P2P functionality to work. It does this during the installation of the program and usually without notification to the user.

As readers of my past rant against Microsoft’s OneCare service will remember, I’m not a fan of anything that automatically circumvents user-established firewall policy without notification.

UPnP devices have been around for a few years now. A non-inclusive list of routers and NAT devices that support UPnP

is http://www.dslreports.com/faq/5310. As you can see, even this small list displays some of the most world’s most popular home-based routers and host-based firewalls.

As Steve Gibson pointed out in his podcast, it isn’t too far fetched to believe that malware may someday implement UPnP coding to circumvent firewalls.

Readers of this column should be familiar with UPnP-based network and firewall devices. Make sure any UPnP-based functionality is disabled in any device you buy, unless you want to manage the inherent risk.

roger_grimes
Columnist

Roger A. Grimes is a contributing editor. Roger holds more than 40 computer certifications and has authored ten books on computer security. He has been fighting malware and malicious hackers since 1987, beginning with disassembling early DOS viruses. He specializes in protecting host computers from hackers and malware, and consults to companies from the Fortune 100 to small businesses. A frequent industry speaker and educator, Roger currently works for KnowBe4 as the Data-Driven Defense Evangelist and is the author of Cryptography Apocalypse.

More from this author