Whitwick & District U3A - Computing tip July 2014
You may have come across an item in the news recently about compromised routers, and probably thought it all too complicated or not relevant to you. Regrettably this may not be the case.
As well as being part of the link between your computer or other devices and the internet, it also plays a role in protecting you from some forms of attack. It does this by blocking most uninvited incoming messages i.e. it is acting as a firewall. This is the default behaviour for most domestic routers, but the can be set to do otherwise.
The compromised routers have a "backdoor", which means that there is a means of changing their settings from the internet, and those changes could disable the firewall function. Since this "backdoor" has been found, the manufacturers have in most cases sorted out a fix to block this behaviour. However, this may or may be not applied automatically by your ISP, and if you have an affected router it may require a sequence of actions on your part.
Generally the affected routers are slightly older models, but it is important to check (see lists below). Do note it is the manufacturer's model number that matters, not who supplied it to you. Hence, for example, you might have a Netgear router supplied to you by BT. Many of the major ISPs have information about whether they provide automatic updates, and if you need to take action. See below.
If in doubt it is worth checking the website of the manufacturer to see if there is an update for your particular model, and if so how to install it.
ISP links
Manufacturer links
Routers probably affected
- Linksys WAG120N
- Netgear DG834B V5.01.14
- Netgear DGN2000 1.1.1, 1.1.11.0, 1.3.10.0, 1.3.11.0, 1.3.12.0
- Netgear WPNT834
- OpenWAG200
- Cisco RVS4000 fwv 2.0.3.2 & 1.3.0.5
- Cisco WAP4410N
- Cisco WRVS4400N
- Cisco WRVS4400N
- Diamond DSL642WLG / SerComm IP806Gx v2 TI LevelOne WBR3460B
- Linksys RVS4000 Firmware V1.3.3.5
- Linksys WAG120N
- Linksys WAG160n v1 and v2
- Linksys WAG200G
- Linksys WAG320N
- Linksys WAG54G2
- Linksys WAG54GS
- Linksys WRT350N v2 fw 2.00.19
- Linksys WRT300N fw 2.00.17 (
- Netgear DG834[, GB, N, PN, GT] version < 5
- Netgear DGN1000
- Netgear DGN1000[B] N150 (
- Netgear DGN2000B
- Netgear DGN3500
- Netgear DGND3300
- Netgear DGND3300Bv2 fwv 2.1.00.53_1.00.53GR
- Netgear DM111Pv2
- Netgear JNR3210
Possibly affected routers
- Linksys WAG160N
- Netgear DG934
- Netgear WG602, WGR614
Routers thought to be OK
- Belkin F5D7230-4 6000
- Belkin F9K1002 v3
- Cisco E2000 fwv 1.0.02
- Cisco Linksys E4200 V1 fwv 1.0.05
- Cisco Linksys X2000
- Cisco EPC3925
- Cisco RV082 v03 fw4.2.2.08
- Linksys E2500
- Linksys E3000 fwv 1.0.04
- Linksys E3200 Firmware Version: 1.0.04 (Build 1)
- Linksys E4200 Firmware Version: 2.0.26
- Linksys RV082 v02 fw2.0.2.01-tm
- Linksys WAG354G V.2 EU
- Linksys WRT100 fwv 1.0.00
- Linksys WRT110 fwv 1.0.07
- Linksys WRT120N fwv 1.0.07
- Linksys WRT160Nv2
- Linksys WRT320N
- Linksys WRT54GL(v1.1) Firmware v4.30.16
- Linksys WRT54GS v1.52.8 build 001
- Linksys WRT600N running 1.01.36 build 3
- Linksys WRT610N V1 fwv 1.00.03 B15
- Netgear CG3100
- Netgear CG3700EMR as provided by ComHem Sweden
- Netgear DG834G v5 (manufactured by Foxconn as opposed to the previous versions)
- Netgear DGN2200Bv3 (V1.1.00.23_1.00.23)
- Netgear DGN3500 (amod 9.3.1 based on official 1.1.00.34 )
- Netgear DGND3700
- Netgear DGND4000 (V1.1.00.14_1.00.14)
- Netgear ProSafe FVS318G fwv 3.1.1-14
- Netgear R4500 firmware V1.0.0.4_1.0.3
- Netgear R6300
- Netgear R7000
- Netgear RP614v[4,2] V1.0.8_02.02 (
- Netgear VMDG480 (aka. VirginMedia SuperHub) swv 2.38.01
- Netgear VMDG485 (aka. VirginMedia SuperHub 2) swv1.01.26
- Netgear WGR614v3
- Netgear WGR614v7
- Netgear WGR614v9
- Netgear WN2500RP
- Netgear WNDR3700
- Netgear WNDR4000
- Netgear WNDR4500
- Netgear WNR2000v3
- Netgear WNR3500L firmware V1.2.2.30_34.0.37
- Netgear WNR3500Lv2
- Sercomm AD81ABA
These lists courtesy of people too numerous to mention.
Previous Win 8 & 8.1 updates |
Back to Information
|
Next Ransomware
|