Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Bug Network Security Wireless Networking Networking Privacy The Internet News Hardware Technology Your Rights Online

Quanta LTE Router May Be Most Unsecure Router Ever Made (softpedia.com) 76

An anonymous reader writes: LTE routers made by Quanta Computer Incorporated, a Taiwanese hardware manufacturer, are plagued by over twenty major security flaws ranging from backdoor accounts to remote code execution bugs, from hardcoded SSH keys to undocumented diagnostics pages, and from weak WPS PINs to network eavesdropping functions. As the researcher explains: "A personal point of view: at best, the vulnerabilities are due to incompetence; at worst, it is a deliberate act of security sabotage from the vendor." The vendor has not fixed any of these issues even after almost four months.
This discussion has been archived. No new comments can be posted.

Quanta LTE Router May Be Most Unsecure Router Ever Made

Comments Filter:
  • So. (Score:4, Funny)

    by rmdingler ( 1955220 ) on Wednesday April 06, 2016 @08:04AM (#51852405) Journal
    The router equivalent of your recorded answering machine message, "Leave a message; we're in Disneyland and you're not!"
    • Re:So. (Score:5, Insightful)

      by Thanshin ( 1188877 ) on Wednesday April 06, 2016 @08:31AM (#51852551)

      The router equivalent of your recorded answering machine message, "Leave a message; we're in Disneyland and you're not!"

      The recorded message would rather have to be:
      "Leave a message; we're in Disneyland. If you're Bob, we left the door open so you can water the plants. Don't worry about the alarm. We changed the passcode to "1111" before turning it off, in case you turn it on by mistake. While you're there, could you check all the money is still on the big desk? We put it there so you could check faster, but now we're worried the wind may have pushed it outside the window. (we left the windows open in case the dog we lost five years ago comes back.)"

  • At least... (Score:4, Funny)

    by BradleyUffner ( 103496 ) on Wednesday April 06, 2016 @08:20AM (#51852479) Homepage

    But at least it's locked down so you can't install any custom firmware and mess with the power levels!

  • by Thanshin ( 1188877 ) on Wednesday April 06, 2016 @08:20AM (#51852481)

    A steel chain with twenty wooden links is still stronger than a steel chain with one paper link.

    A router with no access control whatsoever is less secure than the given example.

    • by Thanshin ( 1188877 ) on Wednesday April 06, 2016 @08:22AM (#51852495)

      Counterarguments:

      A steel chain with steel painted wooden links is way more dangerous than a steel chain with a clearly visible paper link.

      A router identified as having no access control is way safer than a router which is expected to be secure.

  • But "unsecure"? Seriously? Was this writer not aware of the commonly available "insecure" which, I'm guessing since that's a new word to me, means almost the exact same thing??!

    I could get down with "unsecurable", a device that goes out of it's way to keep me from making it more secure than it started out as. There's nothing "insecurable", unless you're some sort of monster trying to spread insecurities to the general populace.

    Com'on editors, you've got one job to do. Why not do it well?

    • by Anonymous Coward on Wednesday April 06, 2016 @08:27AM (#51852527)

      Slashdot Headline May Be Using Most Unpossible English Ever Made

      News at 11

    • by Jason Levine ( 196982 ) on Wednesday April 06, 2016 @08:28AM (#51852535) Homepage

      You want the editors to do their jobs? That's unpossible!

    • I was about to say the same, but it could hurt the editors unsecurities.

    • I'm all for language changing over time

      Shush then.

      "Insecure", to me, is far more commonly used to mean "lacking in confidence." If the editors had gone with that, there'd be dozens of posts mocking the choice and insisting that all the router needs is to be told it's beautiful.

      Someone who is insecure has insecurities. Something which is unsecure does not have unsecurities.

      "Unsecure" has come to take "insecure"'s place since "insecure" gained its psychological connotations (which may have happened around 1980, when "unsecure" started gaining in p

      • Comment removed based on user account deletion
        • No, we re-adopt words ("unsecure" has been around since the century before last) when other words gain new meanings and leave a gap to be filled, or as new technology and new concepts become more prevalent.

          BTW "secure" has the same psychological connotations. Just saying...

          True, but not to the same extent as "insecure." You might ask someone if they were insecure, but you probably wouldn't ask (meaning the exact opposite) if they were secure.

      • by LQ ( 188043 )
        An unsecured system is insecure. If you look at a dictionary for "insecure", it will give different definitions for when applied to people and things.
    • by DarkOx ( 621550 )

      English does not really have many rules, and only descriptive not prescriptive dictionaries. You understood the writers intent, communication was successful. So I would say to you "get over it."

      That said I agree your usage is preferable. The faulty device is insecure.

      I don't think it would be wrong to say, "The house has been left unsecured."

      • by KGIII ( 973947 )

        > I don't think it would be wrong to say, "The house has been left unsecured."

        Nor should you. That's correct usage. Just like unsecured loans.

  • About time? (Score:4, Interesting)

    by TheReaperD ( 937405 ) on Wednesday April 06, 2016 @08:23AM (#51852499)

    Isn't about time for manufacturers to face civil and potentially criminal penalties, plus recalls, for shipping insecure and faulty electronic products like every other product industry? Until is is less expensive to ship a secure (understanding that nothing is perfectly secure) product than it is to pay fines, penalties and recalls, vendors will continue to ship faulty and insecure products. Right now they know that it will cost them little to nothing to deal with insecure and faulty products so they do so with impunity and we get stuck with the crappy products in the end with the only possible recourse being an expensive class-action lawsuit that will take years and net those affected very little in the end. The class-actions tend to be very hard to win as there's very little case precedent for the owners of insecure products. People don't want to be the ones first to risk millions in legal fees and lawyers to set the initial precedence.

    • And criminal penalties means it's for the CEO's and VP's. Or maybe give the coders / IT staff PE powers. So they can tell there boss to F* off and say I'm not signing off on this rushed code with no QA testing.

      • I personally like the idea of whistleblowers getting a share of any fines levied so that it gives them incentive to report any issues that management swept under the rug.

        • whistleblowers need to have full protection from hacking laws

          • So all one would have to do after stealing from a company is admit that fault and disclose the vulnerability?

        • by swb ( 14022 )

          Doesn't this create a moral hazard, where coders or QA testers have a perverse incentive to allow bad code to get established and then blow the whistle?

          I think sometimes "bad projects" can take on a life of their own if they're allowed to get past some initial starting point. It reaches some critical mass where shared complicity, scale and external expectations cause it to seem unfixable without unjust blame, excessive work or external consequences.

          It some ways, it's like the citizens of a nation electing

  • Or least secure?

  • The dipshits at that company refuse to give out any information so that OpenWRT or DDWRT can be easily compiled for it. What is it with china companies being stupid and not embracing a community doing all the programming for them?

  • by LordHighExecutioner ( 4245243 ) on Wednesday April 06, 2016 @09:02AM (#51852719)
    Quanta routing is using Heisenberg's indetermination principle for routing, so their packets are either secure and insecure at the same time.
    Good old newtonian routing policy can fix this.
  • by Virtucon ( 127420 ) on Wednesday April 06, 2016 @09:12AM (#51852779)

    From: https://pierrekim.github.io/bl... [github.io]

    Mar 15, 2016: Quanta confirms the product is EOL and the released firmware was approved by the operator. Quanta can't modify of change without the customer's approval. Quanta does not have plan to patch or change FW as the product is EOL. Quanta thanks Pierre Kim for the information and will consider the findings into our next product development in the near future.

    So then the Vulnerability finder discloses, which is fine but the product is EOL. Don't buy it, don't use it. As a rule don't buy network routers from unknown or little known manufacturers. It may be cheap now but it'll cost you eventually.

    • Other industries, such as cars, if the product you shipped has a serious design flaw then you have to recall and fix it, regardless of the product's age or if it is considered EOL. The same should apply here.

      • by cdrudge ( 68377 )

        In other industries, such as cars, if the product fails craptastically, people can die. If a badly designed coffee pot malfunctions, people could be hurt or die. If a baby crib has a part that is found to be able to break off creating a choking hazard, a baby could die. All these types of events are already covered under existing laws/regulations by several different federal agencies (or by equivalents in many other non-US countries).

        If a router fails due to some massive security holes, no one dies.

        Keep a

        • Unless of course that router is in a hospital or medical insurance office. Then someone very well could die due to incorrect treatment or lack of treatment.
          • by cdrudge ( 68377 )

            There is ZERO chance that said router is in a hospital with medical equipment hooked up to it. And who the hell cares if it's in a medical insurance office. Insurance offices don't provide medical services so zero lives are at risk.

      • Other industries, such as cars, if the product you shipped has a serious design flaw then you have to recall and fix it, regardless of the product's age or if it is considered EOL. The same should apply here.

        And that's up to the laws within a country. Change the laws, or simply just don't buy cheap ass routers.

  • I made a router with no root admin password.

    "Almost" because I didn't plug it into the interwebs :).

    Oh, I guess it doesn't count that I started with a PC, two NICs, and a Linux distro. But hey, it ran Linux, so that counts for something.

    But yeah, as a commercial product that is supposed to be run-able out of the box by an unsophisticated user, I expect it to be "fit for its purpose" - which means that at a minimum, it's security reflects industry best practices.

  • Those backdoors have backdoors in them!
  • Certified Best in Class by the FBI

  • The use of "from x to y," where x and y don't represent the start and end of a range of related items, is called a "false range." Lots of marginal writers use false ranges but this summary contains 3. That's like using everything from soup to dirigibles.

You are always doing something marginal when the boss drops by your desk.

Working...