router vulnerability

According to Security Week and PC World, a serious router vulnerability to the NetUSB driver was discovered last week by researchers at SEC Consult.  The driver was developed by Taiwanese company KCodes, and this security flaw undermines the security of millions of routers worldwide.

NetUSB (USB over IP) kernel driver was intended to allow users, typically on home-based networks, to connect via USB devices lugged in to the router.  It is susceptible to a kernel stack buffer overflow vulnerability, which can be used by hackers to execute malicious code or cause denial-of-service.

KCodes’ NetUSB driver is integrated into products from several vendors, including TRENDnet, Netgear, ZyXEL , and TP-Link, often denoted as “print sharing,” “USB share port” and “ReadySHARE.”  An additional 26 vendors that have likely licensed the NetUSB technology include Allnet, Ambir Technology, AMIT, Asante, Atlantis, Corega, Digitus, EDIMAX, Encore Electronics, Engenius, Etop, Hardlink, Hawking, IOGEAR, LevelOne, Longshine, PCI, PROLiNK, Sitecom, Taifa, and Western Digital.

For more information, visit http://www.pcworld.com/article/2924472/.

 

ASK works with clients such as Granger, Neogen, & Alro Steel to augment or function as internal IT departments, provide 24x7x365 tech support.  From Virtual CIO consulting to the C-suite to full call center and proactive Network Operations Center, ASK meets the IT needs of organizations large and small.  To learn more about what we can do for you, check out our Managed Services page.To schedule a free network security and support analysis, contacts us at sales@justask.net.