{"id":211845,"date":"2018-11-17T19:12:29","date_gmt":"2018-11-17T18:12:29","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=211845"},"modified":"2023-01-31T16:55:37","modified_gmt":"2023-01-31T15:55:37","slug":"botnet-bedroht-116-router-modelle-ber-upnp-lcke","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/11\/17\/botnet-bedroht-116-router-modelle-ber-upnp-lcke\/","title":{"rendered":"Botnet bedroht 116 Router-Modelle &uuml;ber UPnP-L&uuml;cke"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\"\/>Ein k\u00fcrzlich entdecktes Botnet mit dem Namen BCMUPnP_Hunter (Broadcom UPnP Hunter) besteht aus mindestens 100.000 Routern von Heimanwendern und SoHo-Installationen. Es macht sich eine seit f\u00fcnf Jahren bestehende UPnP-L\u00fccke zu Nutze, um die Ger\u00e4te zu befallen. <\/p>\n<p><!--more--><\/p>\n<h2>Die Schwachstelle aus 2013<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/d00e10b593f94b78a8f98c5455231bf9\" width=\"1\" height=\"1\"\/>Bereits im Jahr 2013 hat DefenseCode ein Security Advisory <a href=\"https:\/\/web.archive.org\/web\/20220120004818\/https:\/\/www.defensecode.com\/public\/DefenseCode_Broadcom_Security_Advisory.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Broadcom UPnP Remote Preauth Root Code Execution<\/a> ver\u00f6ffentlicht und auf eine kritische Schwachstelle bei der Broadcom UPnP-Software hingewiesen. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/web.archive.org\/web\/20190513150141\/https:\/\/blog.netlab.360.com\/content\/images\/2018\/11\/Snip20181102_9.png\" width=\"592\" height=\"294\"\/><br \/>(Quelle: NetLab, Scanner IP der letzten 7 Tage weltweit)<\/p>\n<h2>Botnetz BCMUPnP_Hunter ist aktiv<\/h2>\n<p>Jetzt scheint <a href=\"https:\/\/isc.sans.edu\/port.html?port=5431\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Sans-Eintrag<\/a> von Ende M\u00e4rz 2018 wohl das Interesse der Netlab-Forscher geweckt zu haben. Jemand schildert dort eine Beobachtung:<\/p>\n<blockquote>\n<p>Have been observing this for about 45 days now (since 02\/08\/2018). Traffic is very bursty &#8212; scanning occurs for just an hour or two and stops, then repeats every 3-4 days or so. I have also noticed an (oddly) fixed source port of port 6\/tcp on the scan packets. Not sure of the intent &#8212; perhaps looking for Broadcom UPnP? But curious that the scanning starts and stops so abruptly from 10's of thousands of source IPs. Feels botnet-like, but no evidence to support that.<\/p>\n<\/blockquote>\n<p>Dann sind die Sicherheitsforscher von Netlab wohl im September 2018 auf ein Botnet gesto\u00dfen, welches sich genau diese UPnP-Schwachstelle zunutze macht. In <a href=\"https:\/\/web.archive.org\/web\/20220309110225\/https:\/\/blog.netlab.360.com\/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers-en\/\" target=\"_blank\" rel=\"noopener noreferrer\">diesem Beitrag<\/a> beschreiben sie die Entdeckung des Botnet mit dem Namen BCMUPnP_Hunter, welches seit September 2018 aktiv zu sein scheint. Es wurden mindestens 100.000 Ger\u00e4te bei Scans des TCP Port 5431 festgestellt. The Register <a href=\"https:\/\/www.theregister.co.uk\/2018\/11\/08\/upnp_spam_botnet_broadcom\/\" target=\"_blank\" rel=\"noopener noreferrer\">berichtete<\/a> vor einigen Tagen dar\u00fcber. <\/p>\n<h2>Router werden als Spam-Schleuder missbraucht<\/h2>\n<p>Ist ein Router unter der Kontrolle des Botnetzes, wird er mutma\u00dflich als Spam-Schleuder missbraucht. Dazu verbindet sich der Knoten mit zahlreichen E-Mail-Servern wie beispielsweise Outlook, Hotmail und Yahoo!, um Spam zu versenden. 360 Netlab hat eine Liste der von Ihnen gefundenen Router ver\u00f6ffentlicht:<\/p>\n<ul>\n<li>ADB Broadband: HomeStation ADSL Router  <\/li>\n<li>ADB Broadband: ADB ADSL Router  <\/li>\n<li>ADB Broadband: ADB ADSL Router  <\/li>\n<li>ALSiTEC: Broadcom ADSL Router  <\/li>\n<li>ASB: ADSL Router  <\/li>\n<li>ASB: ChinaNet EPON Router  <\/li>\n<li>ASB: ChinaTelecom E8C(EPON) Gateway  <\/li>\n<li>Actiontec: Actiontec GT784WN  <\/li>\n<li>Actiontec: Verizon ADSL Router  <\/li>\n<li>BEC Technologies Inc.: Broadcom ADSL Router  <\/li>\n<li>Best IT World India Pvt. Ltd.: 150M Wireless-N ADSL2+ Router  <\/li>\n<li>Best IT World India Pvt. Ltd.: iB-WRA300N  <\/li>\n<li>Billion: ADSL2+ Firewall Router  <\/li>\n<li>Billion: BiPAC 7800NXL  <\/li>\n<li>Billion: BiPAC 7700N  <\/li>\n<li>Billion: BiPAC 7700N R2  <\/li>\n<li>Binatone Telecommunication: Broadcom LAN Router  <\/li>\n<li>Broadcom: ADSL Router  <\/li>\n<li>Broadcom: ADSL2+ 11n WiFi CPE  <\/li>\n<li>Broadcom: Broadcom Router  <\/li>\n<li>Broadcom: Broadcom ADSL Router  <\/li>\n<li>Broadcom: D-Link DSL-2640B  <\/li>\n<li>Broadcom: D-link ADSL Router  <\/li>\n<li>Broadcom: DLink ADSL Router  <\/li>\n<li>ClearAccess: Broadcom ADSL Router  <\/li>\n<li>Comtrend: AR-5383n  <\/li>\n<li>Comtrend: Broadcom ADSL Router  <\/li>\n<li>Comtrend: Comtrend single-chip ADSL router  <\/li>\n<li>D-Link: D-Link DSL-2640B  <\/li>\n<li>D-Link: D-Link DSL-2641B  <\/li>\n<li>D-Link: D-Link DSL-2740B  <\/li>\n<li>D-Link: D-Link DSL-2750B  <\/li>\n<li>D-Link: D-LinkDSL-2640B  <\/li>\n<li>D-Link: D-LinkDSL-2641B  <\/li>\n<li>D-Link: D-LinkDSL-2741B  <\/li>\n<li>D-Link: DSL-2640B  <\/li>\n<li>D-Link: ADSL 4*FE 11n Router  <\/li>\n<li>D-Link: D-Link ADSL Router  <\/li>\n<li>D-Link: D-Link DSL-2640U  <\/li>\n<li>D-Link: D-Link DSL-2730B  <\/li>\n<li>D-Link: D-Link DSL-2730U  <\/li>\n<li>D-Link: D-Link DSL-2750B  <\/li>\n<li>D-Link: D-Link DSL-2750U  <\/li>\n<li>D-Link: D-Link DSL-6751  <\/li>\n<li>D-Link: D-Link DSL2750U  <\/li>\n<li>D-Link: D-Link Router  <\/li>\n<li>D-Link: D-link ADSL Router  <\/li>\n<li>D-Link: DVA-G3672B-LTT Networks ADSL Router  <\/li>\n<li>D-Link: D-Link DSL-2730B  <\/li>\n<li>D-Link: D-Link VDSL Router  <\/li>\n<li>D-Link: DLink ADSL Router  <\/li>\n<li>D-Link: D-Link DSL-225  <\/li>\n<li>DARE: Dare route  <\/li>\n<li>DQ Technology: ADSL2+ 11n WiFi CPE  <\/li>\n<li>DQ Technology: Broadcom ADSL Router  <\/li>\n<li>DSL: ADSL Router  <\/li>\n<li>DareGlobal: D-Link ADSL Router  <\/li>\n<li>Digicom: ADSL Wireless Modem\/Router  <\/li>\n<li>Digicom: RAW300C-T03  <\/li>\n<li>Eltex: Broadcom ADSL Router  <\/li>\n<li>FiberHome: Broadcom ADSL Router  <\/li>\n<li>GWD: ChinaTelecom E8C(EPON) Gateway  <\/li>\n<li>Genew: Broadcom ADSL Router  <\/li>\n<li>huaqin: HGU210 v3 Router  <\/li>\n<li>iBall Baton: iBall Baton 150M Wireless-N ADSL2+ Router  <\/li>\n<li>iiNet: BudiiLite  <\/li>\n<li>iiNet: BoB2  <\/li>\n<li>iiNet: BoBLite  <\/li>\n<li>INTEX: W150D  <\/li>\n<li>INTEX: W300D  <\/li>\n<li>INTEX: Wireless N 150 ADSL2+ Modem Router  <\/li>\n<li>INTEX: Wireless N 300 ADSL2+ Modem Router  <\/li>\n<li>ITI: ITI Ltd.ADSL2Plus Modem\/Router  <\/li>\n<li>Inteno: Broadcom ADSL Router  <\/li>\n<li>Intercross: Broadcom ADSL Router  <\/li>\n<li>IskraTEL: Broadcom ADSL Router  <\/li>\n<li>Kasda: Broadcom ADSL Router  <\/li>\n<li>Link-One: Modem Roteador Wireless N ADSL2+ 150 Mbps  <\/li>\n<li>Linksys: Cisco X1000  <\/li>\n<li>Linksys: Cisco X3500  <\/li>\n<li>NB: DSL-2740B  <\/li>\n<li>NetComm: NetComm ADSL2+ Wireless Router  <\/li>\n<li>NetComm: NetComm ADSL2+ Wireless Router  <\/li>\n<li>NetComm: NetComm WiFi Data and VoIP Gateway  <\/li>\n<li>OPTICOM: DSLink 279  <\/li>\n<li>Opticom: DSLink 485  <\/li>\n<li>Orcon: Genius  <\/li>\n<li>QTECH: QTECH  <\/li>\n<li>Raisecom: Broadcom ADSL Router  <\/li>\n<li>Ramptel: 300Mbps ADSL Wireless-N Router  <\/li>\n<li>Router: ADSL2+ Router  <\/li>\n<li>SCTY: TYKH PON Router  <\/li>\n<li>Star-Net: Broadcom ADSL Router  <\/li>\n<li>Starbridge Networks: Broadcom ADSL Router  <\/li>\n<li>TP-LINK: 300Mbps Wireless N ADSL2+ Modem Router  <\/li>\n<li>TP-LINK: 300Mbps Wireless N USB ADSL2+ Modem Router  <\/li>\n<li>TP-LINK: TP-LINK Wireless ADSL2+ Modem Router  <\/li>\n<li>TP-LINK: TP-LINK Wireless ADSL2+ Router  <\/li>\n<li>Technicolor: CenturyLink TR-064 v4.0  <\/li>\n<li>Tenda: Tenda ADSL2+ WIFI MODEM  <\/li>\n<li>Tenda: Tenda ADSL2+ WIFI Router  <\/li>\n<li>Tenda: Tenda Gateway  <\/li>\n<li>Tenda\/Imex: ADSL2+ WIFI-MODEM WITH 3G\/4G USB PORT  <\/li>\n<li>Tenda\/Imex: ADSL2+ WIFI-MODEM WITH EVO SUPPORT  <\/li>\n<li>UTStarcom: UTStarcom ADSL2+ Modem Router  <\/li>\n<li>UTStarcom: UTStarcom ADSL2+ Modem\/Wireless Router  <\/li>\n<li>UniqueNet Solutions: WLAN N300 ADSL2+ Modem Router  <\/li>\n<li>ZTE: Broadcom ADSL Router  <\/li>\n<li>ZTE: ONU Router  <\/li>\n<li>ZYXEL: ZyXEL VDSL Router  <\/li>\n<li>Zhone: Broadcom ADSL Router  <\/li>\n<li>Zhone: Zhone Wireless Gateway  <\/li>\n<li>Zoom: Zoom Adsl Modem\/Router  <\/li>\n<li>ZyXEL: CenturyLink UPnP v1.0  <\/li>\n<li>ZyXEL: P-660HN-51  <\/li>\n<li>ZyXEL: ZyXEL xDSL Router<\/li>\n<\/ul>\n<p>Die Liste erhebt aber keinen Anspruch auf Vollst\u00e4ndigkeit. Sch\u00fctzen kann man sich, indem man UPnP in der Konfiguration des Routers deaktiviert. Alternativ kann man schauen, ob der Router-Hersteller ein Firmware-Update bereitstellt. Weitere Details sind dem <a href=\"https:\/\/web.archive.org\/web\/20220309110225\/https:\/\/blog.netlab.360.com\/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers-en\/\" target=\"_blank\" rel=\"noopener noreferrer\">NetLab-Bericht<\/a> (Englisch) oder den Beitr\u00e4gen von <a href=\"https:\/\/www.heise.de\/security\/meldung\/Jetzt-patchen-Fuenf-Jahre-alte-Luecke-in-Routern-als-Einfallstor-fuer-Angreifer-4220131.html\" target=\"_blank\" rel=\"noopener noreferrer\">heise.de<\/a> und <a href=\"https:\/\/www.computerbase.de\/2018-11\/router-botnetz-upnp-luecke\/\" target=\"_blank\" rel=\"noopener noreferrer\">ComputerBase<\/a>.<\/p>\n<h2>Schwachstellen bei D-LINK <\/h2>\n<p>Weil es gerade passt: Bei D-LINK finden sich im Central WiFiManager CWM-100 mehrere Sicherheitsl\u00fccken. <\/p>\n<ul>\n<li><a href=\"https:\/\/seclists.org\/fulldisclosure\/2018\/Nov\/27\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-15516 \/ D- LINK Central WifiManager CWM-100 \/ FTP Server PORT Bounce Scan<\/a> <em>hyp3rlinx (Nov 09)<\/em>  <\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20211209023828\/https:\/\/seclists.org\/fulldisclosure\/2018\/Nov\/28\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-15517 \/ D-LINK Central WifiManager CWM-100 \/ Server Side Request Forgery<\/a> <em>hyp3rlinx (Nov 09)<\/em>  <\/li>\n<li><a href=\"https:\/\/seclists.org\/fulldisclosure\/2018\/Nov\/29\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-15515 \/ D-LINK Central WifiManager CWM-100 \/ Trojan File SYSTEM Privilege Escalation<\/a> <em>hyp3rlinx (Nov 09)<\/em><\/li>\n<\/ul>\n<blockquote>\n<p>Tipp: Bei heise.de kann man <a href=\"https:\/\/web.archive.org\/web\/20220805115905\/https:\/\/www.four.heise.de\/security\/dienste\/portscan\/test\/go.shtml?scanart=1\" target=\"_blank\" rel=\"noopener noreferrer\">diese Seite<\/a> aufrufen und einen Scan seiner Ports durchf\u00fchren lassen. Die Seite zeigt sehr schnell, ob es dort Probleme mit offenen Ports gibt. <\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Ein k\u00fcrzlich entdecktes Botnet mit dem Namen BCMUPnP_Hunter (Broadcom UPnP Hunter) besteht aus mindestens 100.000 Routern von Heimanwendern und SoHo-Installationen. Es macht sich eine seit f\u00fcnf Jahren bestehende UPnP-L\u00fccke zu Nutze, um die Ger\u00e4te zu befallen.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[731,426],"tags":[2272,2038,4328],"class_list":["post-211845","post","type-post","status-publish","format-standard","hentry","category-gerate","category-sicherheit","tag-botnet","tag-router","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/211845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=211845"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/211845\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=211845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=211845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=211845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}