Assessing embedded network device insecurity -

Assessing embedded network device insecurity


We have systematically scanned large portions of the Internet to monitor the presence of trivially vulnerable embedded devices.

In this paper, we present a quantitative lower bound on the number of vulnerable embedded device on a global scale. At the time of writing, we have identifed over 540,000 publicly accessible embedded devices configured with factory default root passwords.

This constitutes over 13% of all discovered embedded devices. These devices range from enterprise equipment such as firewalls and routers to consumer appliances such as VoIP adapters, cable and IPTV boxes to office equipment such as network printers and video conferencing units.

Vulnerable devices were detected in 144 countries, across 17,427 unique private enterprise, ISP, government, educational, satellite provider as well as residential network environments.

Preliminary results from our longitudinal study tracking over 102,000 vulnerable devices revealed that over 96% of such accessible devices remain vulnerable after a 4-month period.

We believe the data presented in this paper provides a conservative lower bound on the actual population of vulnerable devices in the wild.

By combining the observed vulnerability distributions and its potential root causes, in this paper is proposed a set of mitigation strategies and hypothesize about its quantitative impact on reducing the global vulnerable embedded device population.

To read this external content in full, download the complete article from the author article archives at Columbia University.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.