his findings with German newspaper Heise.de . The vulnerability affectsVulnerability-related.DiscoverVulnerabilityTP-Link model M5350 , a 3G mobile Wi-Fi router , often distributed by mobile telco providers to their customers , along with a SIM card they insert in the router . This SIM card allows the router to connect to the mobile operator 's network , and just like any SIM card , has its own telephone number . In an online conversation with Bleeping Computer , Hörsch , who 's a researcher for German cyber-security firm Securai , says that after he analyzed the router 's firmware , he discoveredVulnerability-related.DiscoverVulnerabilitya vulnerability in the feature that handles incoming SMS messages . By sending the following SMS , the router would answer back with the admin account password , the Wi-Fi network SSID , and the Wi-Fi network 's password . The issue is n't as dangerous as it sounds , mainly because the attacker needs to know the router SIM card 's phone number in order to exploit it , Hörsch told Bleeping Computer . This issue is one of many the researcher discoveredVulnerability-related.DiscoverVulnerabilityin recent months in various devices . His findings were summarized and presented in a talk at the recently concluded Kaspersky Security Analyst Summit ( SAS ) , held last week . In the same talk , Hörsch also presentedVulnerability-related.DiscoverVulnerabilityseveral other vulnerabilities that allowed him to obtain root access to Hootoo Travelmate and Trendnet TEW714TRU routers and Vstarcam webcams . Other vulnerabilities the researcher discoveredVulnerability-related.DiscoverVulnerabilityand presentedVulnerability-related.DiscoverVulnerabilityat SAS include the presence of a hardcoded Telnet password in Startech modems , and a very simple to exploit authentication bypass for Panasonic BM ET200 retina scanners , which allowed anyone access to the admin panel just by deleting a few parameters in an URL . His presentationVulnerability-related.DiscoverVulnerabilityalso detailedVulnerability-related.DiscoverVulnerabilityseveral flaws in Western Digital MyCloud NAS hard drives , some of which were made public at the start of March by another researcher who disclosedVulnerability-related.DiscoverVulnerabilitythe bugs .
With everything that ’ s gone down in 2016 it ’ s easy to forget Tim Cook ’ s and Apple ’ s battle with the FBI over data encryption laws . Apple took a strong stance though , and other tech giants followed suite leading to a victory of sorts for ( the little guy in ) online privacy . In this era of web exposure , it was a step in the right direction for those who feel our online identities are increasingly vulnerable on the web . All of this stands for little though when a security flaw in your operating system allows carefully encrypted messages to be effectively decrypted offline . That ’ s what happened to Apple with its iOS 9.2 operating system . Though the patches that ensued largely fixedVulnerability-related.PatchVulnerabilitythe problem , the whole issue has understandably left iOS users with questions . What really happened and are we at immediate risk ? A paper released in March by researchers at John Hopkins University exposedVulnerability-related.DiscoverVulnerabilityweaknesses in Apple ’ s iMessage encryption protocol . It was foundVulnerability-related.DiscoverVulnerabilitythat a determined hacker could intercept the encrypted messages between two iPhones and reveal the 64-digit key used to decrypt the messages . As iMessage doesn ’ t use a Message Authentication Code ( MAC ) or authenticated encryption scheme , it ’ s possible for the raw encryption stream , or “ ciphertext ” to be tampered with . iMessage instead , uses an ECDSA signature which simulates the functionality . It ’ s still no easy feat exploiting the security flaw detailedVulnerability-related.DiscoverVulnerabilityby the researchers . The attacker would ultimately have to predict or know parts of the message they are decrypting in order to substitute these parts in the ciphertext . Knowing whether the substitution has been successful though , is a whole other process which may only be possible with attachment messages . The full details of the security flaw , and the complex way it can be exploitedVulnerability-related.DiscoverVulnerabilityare detailedVulnerability-related.DiscoverVulnerabilityin the John Hopkins paper . The paper includes the recommendation that , in the long run , “ Apple should replace the entirety of iMessage with a messaging system that has been properly designed and formally verified ” . One thing that should be made clear is that these weaknesses were exposedVulnerability-related.DiscoverVulnerabilityas a result of months of investigation by an expert team of cryptologists . The type of hacker that would take advantage of these weaknesses would undeniably be a sophisticated attacker . That of course doesn ’ t mean that Apple shouldn ’ t take great measures to eradicate this vulnerability in their system . Your messages , though , are not immediately at risk of being decrypted , and much less if you ’ ve installed the patches that came with iOS 9.3 and OS X 10.11.4 ( though they don ’ t completely fixVulnerability-related.PatchVulnerabilitythe problem ) . Tellingly , the flaws can ’ t be used to exploit numerous devices at the same time . As already mentioned , the process that was exposed by the John Hopskins paper is incredibly complex and relies on various steps that are by no means easy to complete successfully .
With everything that ’ s gone down in 2016 it ’ s easy to forget Tim Cook ’ s and Apple ’ s battle with the FBI over data encryption laws . Apple took a strong stance though , and other tech giants followed suite leading to a victory of sorts for ( the little guy in ) online privacy . In this era of web exposure , it was a step in the right direction for those who feel our online identities are increasingly vulnerable on the web . All of this stands for little though when a security flaw in your operating system allows carefully encrypted messages to be effectively decrypted offline . That ’ s what happened to Apple with its iOS 9.2 operating system . Though the patches that ensued largely fixedVulnerability-related.PatchVulnerabilitythe problem , the whole issue has understandably left iOS users with questions . What really happened and are we at immediate risk ? A paper released in March by researchers at John Hopkins University exposedVulnerability-related.DiscoverVulnerabilityweaknesses in Apple ’ s iMessage encryption protocol . It was foundVulnerability-related.DiscoverVulnerabilitythat a determined hacker could intercept the encrypted messages between two iPhones and reveal the 64-digit key used to decrypt the messages . As iMessage doesn ’ t use a Message Authentication Code ( MAC ) or authenticated encryption scheme , it ’ s possible for the raw encryption stream , or “ ciphertext ” to be tampered with . iMessage instead , uses an ECDSA signature which simulates the functionality . It ’ s still no easy feat exploiting the security flaw detailedVulnerability-related.DiscoverVulnerabilityby the researchers . The attacker would ultimately have to predict or know parts of the message they are decrypting in order to substitute these parts in the ciphertext . Knowing whether the substitution has been successful though , is a whole other process which may only be possible with attachment messages . The full details of the security flaw , and the complex way it can be exploitedVulnerability-related.DiscoverVulnerabilityare detailedVulnerability-related.DiscoverVulnerabilityin the John Hopkins paper . The paper includes the recommendation that , in the long run , “ Apple should replace the entirety of iMessage with a messaging system that has been properly designed and formally verified ” . One thing that should be made clear is that these weaknesses were exposedVulnerability-related.DiscoverVulnerabilityas a result of months of investigation by an expert team of cryptologists . The type of hacker that would take advantage of these weaknesses would undeniably be a sophisticated attacker . That of course doesn ’ t mean that Apple shouldn ’ t take great measures to eradicate this vulnerability in their system . Your messages , though , are not immediately at risk of being decrypted , and much less if you ’ ve installed the patches that came with iOS 9.3 and OS X 10.11.4 ( though they don ’ t completely fixVulnerability-related.PatchVulnerabilitythe problem ) . Tellingly , the flaws can ’ t be used to exploit numerous devices at the same time . As already mentioned , the process that was exposed by the John Hopskins paper is incredibly complex and relies on various steps that are by no means easy to complete successfully .
The problems arise fromVulnerability-related.DiscoverVulnerabilitythe way Java and Python ( through the urllib2 library in Python 2 and urllib library in Python 3 ) handle FTP links , which allow the attacker to inject newline ( CRLF ) characters inside the URL , making the Java and Python code think some parts of the URL are new commands . This leads to a flaw that security researchers callVulnerability-related.DiscoverVulnerability`` protocol injection . '' The FTP protocol injection issue was first detailedVulnerability-related.DiscoverVulnerabilityby Russian security lab ONsec in 2014 , but never got the public attention it needed . Two recent reportsVulnerability-related.DiscoverVulnerabilityhave raisedVulnerability-related.DiscoverVulnerabilitythe profile of this flaw , describing two new exploitation scenarios . Security researcher Alexander Klink detailedVulnerability-related.DiscoverVulnerabilityon his blog how the FTP protocol injection flaw could be used to send emails using Java 's FTP URL handler . Two days later , Timothy Morgan of Blindspot Security came forward and presentedVulnerability-related.DiscoverVulnerabilitya more ominious exploitation scenario where the FTP URL handlers in Java and Python could be used to bypass firewalls . Morgan also revealedVulnerability-related.DiscoverVulnerabilitythat his company informedVulnerability-related.DiscoverVulnerabilityboth the Python team ( in January 2016 ) and Oracle ( in November 2016 ) about the FTP protocol injection flaw , but neither have issued updates to addressVulnerability-related.PatchVulnerabilitythe reported problem . At the heart of the FTP protocol injection attack resides an older issue in the FTP protocol itself , which is classic mode FTP . The classic mode FTP is an older mechanism that governs how FTP clients and servers interact , which was proved to be insecure in issue # 60 of the Phrack hacking magazine and later detailed in more depth by Florian Weimer . Classic mode FTP has been replaced by a more secure method of client-server FTP interactions known as passive mode FTP . Nevertheless , most firewall products support classic mode FTP connections .