Outline ·
[ Standard ] ·
Linear+
Unifi WARNING TO ALL UNIFI USERS, Threat warning, read inside
|
sg999
|
Jun 17 2010, 11:01 AM
|
|
Telekom Malaysia Berhad wishes to clarify the concerns raised by various parties with regards to the remote accessibility of UniFi routers which are part of the customer premises equipment (CPE) for all UniFi subscribers.
TM would like to assure all concerned parties that the only reason the UniFi router setting for remote access is enabled is for remote access troubleshooting purposes for the express use of our technical support personnel. In the event there is a technical support issue with any of our UniFi subscribers; at the first level of troubleshooting, TM’s network operation centre (NOC) can immediately remotely diagnose the problem before sending a support team on-site.
TM takes note of the security concerns that have been raised, and we have taken these issues to heart.
TM also acknowledges that there is a need to balance the public’s level of comfort with regards to security and privacy and TM’s own commitment to faster support turnaround time. As such, TM would like to maintain the higher level of service enabled by remote access management on customer routers, and in recognition of that TM will immediately change every UniFi customers’ router management password into a high security, unique one (which will be only known to the customer and TM). TM will notify all our Unifi customers of this change accordingly.
|
|
|
|
|
|
azrinarizz
|
Jun 17 2010, 06:06 PM
|
|
I just got my unifi today and when I log in my router, I can't see TR-069 Protocol as well as my operator password. I have already changed my wireless password as well as my admin password. I am using firmware 7.05 which is shown on my router page. I saw a few pages back that I have to UNTICK Enable Remote Management? Thanks
|
|
|
|
|
|
TSrizvanrp
|
Jun 17 2010, 06:08 PM
|
Getting Started
|
|
|
|
|
|
|
azrinarizz
|
Jun 17 2010, 06:14 PM
|
|
How do I log into the operator account. I have been reading the guide for 3 times already  Mine only contain the admin password box and and remote management. I don't see any operator as well as SSH+Telnet like your picture
|
|
|
|
|
|
TSrizvanrp
|
Jun 17 2010, 06:17 PM
|
Getting Started
|
go to the login page at 192.168.0.1
username : operator pass : telekom
or pass : your pppoe pass backwards
or pass : unifi backwards
if these combinations dont work ask your installer for the 'operator' account password
|
|
|
|
|
|
azrinarizz
|
Jun 17 2010, 06:21 PM
|
|
QUOTE(rizvanrp @ Jun 17 2010, 06:17 PM) go to the login page at 192.168.0.1 username : operator pass : telekom or pass : your pppoe pass backwards or pass : unifi backwards if these combinations dont work ask your installer for the 'operator' account password Oh, I get it now  So I have changed my operator and admin password. I have followed your guide on what to disable The only thing I didn't enable is the Firewall. Should I enable it? I download pretty often using utorrent. So will it have any problems if I enable?  Thank you so much for helping. That is all right? This post has been edited by azrinarizz: Jun 17 2010, 06:22 PM
|
|
|
|
|
|
TSrizvanrp
|
Jun 17 2010, 06:25 PM
|
Getting Started
|
Firewall.. I don't know, BT is kinda heavy on home router firewalls. You can enable it if you want but NAT + securing your router should be enough protection.
|
|
|
|
|
|
azrinarizz
|
Jun 17 2010, 06:28 PM
|
|
QUOTE(rizvanrp @ Jun 17 2010, 06:25 PM) Firewall.. I don't know, BT is kinda heavy on home router firewalls. You can enable it if you want but NAT + securing your router should be enough protection. Ok then. I will see how my torrent goes and I can change it later. I am wondering, what is NAT?
|
|
|
|
|
|
TSrizvanrp
|
Jun 17 2010, 06:30 PM
|
Getting Started
|
QUOTE(azrinarizz @ Jun 17 2010, 06:28 PM) Ok then. I will see how my torrent goes and I can change it later. I am wondering, what is NAT?  You have a single public IP (110.159.x.x) which is shared on a private network (192.168.0.0/24). That's wut NAT does.. unless you enable port forwarding, no one will be able to connect to PCs behind your router on the private network directly so in that way it's 'secure' :3
|
|
|
|
|
|
azrinarizz
|
Jun 17 2010, 06:33 PM
|
|
QUOTE(rizvanrp @ Jun 17 2010, 06:30 PM) You have a single public IP (110.159.x.x) which is shared on a private network (192.168.0.0/24). That's wut NAT does.. unless you enable port forwarding, no one will be able to connect to PCs behind your router on the private network directly so in that way it's 'secure' :3 Oh alright. I get it now. Thanks for helping me out
|
|
|
|
|
|
KAHAK
|
Jun 17 2010, 11:48 PM
|
Getting Started

|
so that what NAT do LoL i never know.
|
|
|
|
|
|
sfwong1
|
Jun 18 2010, 12:20 AM
|
|
Woot nice thing here,i think this thread should be pin up so that all unifi user will be aware of it... luckily my unifi not yet set up the technician will soon be here to do the unifi... i sure shoot him kau kau.
|
|
|
|
|
|
Phantasy
|
Jun 19 2010, 11:06 AM
|
New Member
|
QUOTE Hehehe just for those who set username n password for ppoe into ur ADSL modem also pls change the default password because ppl can scan ip and get into ur ADSL modem and get ur username n password - MX510 Wow i thought i was already fixed by tmnet.It had been so many years since this exploit found and abused by many ppl. You just need a simple scanning proggie and voila you can have access to the user's router web management page. What was disclosed by rizvanrp was indeed repeated the whole history again but now with an open sshd laying inside it makes the hackers jumping yay  all around.
|
|
|
|
|
|
Wazzzap
|
Jun 20 2010, 02:58 PM
|
|
i wanna ask why is my internet connection having problem after i untick the remote management box? but there is no problem if i tick it. hmmm..
|
|
|
|
|
|
buyoq
|
Jun 23 2010, 06:53 PM
|
|
eh where's the CCNP's guy now ?
|
|
|
|
|
|
Invince_Z
|
Jun 25 2010, 06:09 AM
|
|
great post by rizvanrp. x a unifi user anyway, but if i'm a hacker, this would be Heaven (me) n Hell for all of u
|
|
|
|
|
|
Moogle Stiltzkin
|
Jun 25 2010, 01:29 PM
|
|
QUOTE(morpheus3929 @ Jun 25 2010, 04:57 AM) HOLY CRAP! JUMPIN JIGGAWATS WATSON! dude, by uploading the screenshot, aren't you risking yourself and other UNIFI subscribers from hackers and arseholes?  Don't worry. tmnut is keeping tabs so they should fix it.
|
|
|
|
|
|
greg_F
|
Jun 27 2010, 04:57 PM
|
New Member
|
it's funny how a final year student can open up the eyes of experts & technical staffs at TM...i give u crdt on this rizvan...u really know ur stuff...and i can see that u will have a bright future in the network/security field if u are in it... to me, they can have or enable the remote management but not set the source of IP to 0.0.0.0...that's like inviting everyone to your router...what TM could do is set a specific IP that could access that router...eg. for this area/block of users, only IP 202.108.0.133 can access that router...this will slightly narrow down the possibility of an intrusion, but not totally....all IT/network/security experts should know that no system or machine is 100% secured...also, TM should crack their heads to harden that busy box...ever heard of soekris or magic box?...small as they are, big on their capabilities... juz my 2 cents
|
|
|
|
|
|
TSrizvanrp
|
Jun 27 2010, 05:05 PM
|
Getting Started
|
@greg It doesn't even matter if they did do the IP based hardening or set up a 50 character random password.  This is a snapshot of the source code of the page which handles the backup/restore configuration section of the routers user interface. The firmware itself is flawed. It pulls the configuration backup file directly from the router without running through PHP (requiring authentication).. so anyone can still break into the router easily just by grabbing the config.bin directly. You don't even have to login with a username or password <_> Frankly, TM should have not chosen this remote configuration route and been open with it in the first place. Even if I did not guess the password, retrieving it is easy by hooking up a terminal connection directly into the DIR-615's console port and dumping its memory over the network + carving out the user/pass combination. The only way to fix this flaw is to disable the remote management.. and even then, users on your own LAN will still be able to pull of the hack so public Unifi networks (hotspots/hostels) using this DIR-615 G1 router will never be secure. This post has been edited by rizvanrp: Jun 27 2010, 05:11 PM
|
|
|
|
|