meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, April 11th 2017

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 11 April 2017

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. TPLink Modem SMS Vulnerability;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, April 11th, 2017 edition of the Santernet Storm Center's Stormcast.

0:07.5

My name is Johannes Ulrich, and I am recording from Orlando, Florida.

0:12.7

Jan Hirsch of German security company Securai found an interesting vulnerability in TPLink 3G modems slash routers.

0:24.0

These are devices that you use to connect your systems to 3G or LTE networks.

0:30.9

And the interesting part here is that if this particular device receives a specific SMS message, it will respond with the admin

0:42.3

username and password. Apparently this was a left behind debug features. Of course, these

0:49.3

modems are designed to receive SMS messages and, yes, typically use a little web interface or so to read them

0:57.6

or send messages yourself. There have been similar vulnerabilities like this in the past. Usually

1:04.8

actually one vulnerability that often does show up in these SMSed devices is also the ability to update the firmer

1:14.3

with random URLs that are being passed to the device.

1:19.9

Mr. Hirsch found a number of additional vulnerabilities that are listed in the article,

1:24.7

for example, a StarTech Wi-Fi router that uses a hard-coded admin

1:30.7

password, so the user can't change it. I think that's almost a standard feature in devices like this.

1:38.2

And he also, and that's sort of almost the main point of the article, complains that it's very difficult and fruitless in many cases

1:46.9

to actually report these vulnerabilities to the vendor.

1:51.5

And Google Maps in the headlines again.

1:54.5

If you remember a couple years ago, one thing that often happened with Google Maps was

2:00.1

that people were attaching fake phone numbers

2:04.4

to listings like, for example, FBI offices or IRS offices.

2:10.1

So if someone looked them up via Google Maps, they then received the wrong phone number.

2:16.9

Well, since then, Google has tightened up the

2:20.3

verification process somewhat, but obviously not well enough. And recently, according to

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.