BT Home Hub "spits out password to hackers"
By Barry Collins
Posted on 28 May 2008 at 10:32
An "ethical hacking outfit" claims to have found a new security hole in BT's Home Hub router.
The Hub has been the subject of a number of recent security flaws, which culminated in the company changing the default password on the routers from "admin" to the unique serial number of the device, in order to prevent hackers from gaining access to the device.
However, the GNUCitizen blog claims it's possible to make the Home Hub spit out that unique serial number to would-be attackers.
"It turns out that you can get the serial number of the Home Hub by simply sending a Multi Directory Access Protocol (MDAP) multicast request in the network where BT Home Hub is located," the blog claims.
"Yes, you must already be part of the LAN where the Home Hub is present, either via ethernet or via Wi-Fi. However, at GNUCitizen, we have demonstrated trivial ways to predict the WEP encryption key of the Home Hub if you know what you are doing."
GNUCitizen points the finger of blame squarely at BT. "Obviously, this is not a vulnerability within the MDAP protocol, but rather a design flaw introduced by BT with the new unique admin password feature," it claims.
"The assumption behind this insecure implementation is that the serial number can only be obtained by the legitimate owner of the router. As we have seen, this is not the case!"
BT Home Hub users can obviously avoid the problem by creating their own password and changing the Hub's default security from the widely-cracked WEP to the more secure WPA. BT provides instructions on how to do this here.
Last October, BT was forced to remove a Remote Assistance feature from the Hub, after GNUCitizen found that it could lead to hackers taking complete ownership of the device.
BT was unavailable for comment at the time of publication.
Is your business a social business? For helpful info and tips visit our hub.
- Quickest way to upload 1GB? Hop on a train
- Move over Delia: IBM Watson is cooking tonight
- Eric Schmidt on the double-edged smartphone: friend and foe
- Getty joins the race to the bottom
- Hour of Code: five steps to learn how to code
- Sony Xperia Z2 Tablet review: first look
- Sony Xperia Z2 review: first look
- Samsung Galaxy Gear 2 review: first look
- Nokia XL review: first look
- Samsung Galaxy S5 review: first look
- Headings vs headers: how to use both in Word
- Windows Server 2012 R2: how the Datacenter edition could change SMBs
- Invoices and VAT: how to set up your documents correctly
- Nexus 5 vs Samsung Galaxy S4 Active: the best phone for avoiding screen burn
- How much is a social user worth?
- The key to choosing a secure password
- Thunderbolt Bridge: a fast Mac migration tool
- Should you advertise on Twitter?
- How to track a lost smartphone
- Self-publishing success: the best way to sell your book