Sales
0161 215 3700
0800 458 4545
Support
0800 230 0032
0161 215 3711
Fast Chat

Welcome to UKFast, do you have a question? Our hosting experts have the answers.

Sarah Wilson UKFast | Account Manager

Be Unlimited router security flaw update

Be Unlimited router security flaw update

Remember THIS (exploit details)? It's now emerged that advice being given by 'Be Unlimited' to its broadband customers can actually cause the same security flaw to re-appear, albeit only temporarily:

Be responded by first accusing Karunaratne of hacking its internal network, and then booting him off the service. It released a firmware update in March which tightened up the access control list for the telnet service ports.

However, it's emerged that whenever the router is reset to factory settings - which Be recommends as part of the procedure for switching from a dynamic to a static IP, for example - the configuration is refreshed with the original access control list, leaving it wide open once again. Customers sometimes restore factory settings when the router crashes too.

Typically the issue reported by The Register does not appear to affect Be's newer routers, only older ones and the ISP does have a partial solution in place:

BE: "Access is restricted to specific IP addresses. This is managed through new firmware we released in March 2007. All new members that have joined since then have received Be Boxes with the updated firmware on. For all members that joined prior to that Be runs a script multiple times a day to update members firmware with the relevant patch."

Thankfully O2’s broadband customers will not be affected as they’re given the newer routers too.


print this article

Return to hosting news headlines
View Hosting News Archive

Share with: