How to fix the UPnP security holes
Source: ZDNet Blogs - Posted by Anthony Pell   
Host Security The US Department of Homeland Security is urging everyone to disable the common networking Universal Plug and Play (UPnP) protocol. This is being done because Rapid7 security researchers have found that tens of million devices worldwide are wide open to attack because of flaws in the network protocol and its implementations. While the US Computer Emergency Readiness Team (US-CERT) specifically talks about devices that use versions of libupnp, the open-source portable software development kit (SDK) for UPnP earlier than 1.6.18, UPnP has been, is now, and will always be a security nightmare of a protocol.

Read this full article at ZDNet Blogs

Only registered users can write comments.
Please login or register.

Powered by AkoComment!