Singaporean broadband users were left vulnerable to attackers after their ISP opened remote access ports on their modems and forgot to close them.
The discovery was made by NewSky Security researcher Ankit Anubhav, who used Shodan to scan for SingTel routers open on port 10,000 – the default Network Data Management Protocol TCP/UDP port.
Anubhav said the scan yielded 975 devices that had port 10,000 open with no protection, as a result of a fault-finding exercise gone wrong (that number is only those found on the scan).
When NewSky alerted Singapore's CERT, and that body took the issue to SingTel, Anubhav said the root cause was that SingTel enabled port 10,000 to troubleshoot a problem with the SingTel-branded routers (the “Wi-Fi Gigabit Router” is supplied by Arcadyan).
(Score: 2) by wonkey_monkey on Wednesday May 30 2018, @07:08PM
The ports got killed by a drunk driver?
systemd is Roko's Basilisk