Sky routers left vulnerable to traffic-hijacking flaw for more than a year as company claims challenges in patch rollout process
A security flaw left six million Sky routers vulnerable to serious attacks for 18 months, researchers have said.
The bug could have allowed attackers to route online traffic through a malicious server, enabling them to steal passwords and other sensitive information, Pen Test Partners said.
Sky said it fixed the issue in October, 18 months after it had been notified by researchers.
The company said delivering a fix to multiple router models took time.
The researchers recommended users change their default router administrator passwords. Users who had not changed the password could have been more easily exploited. There is no evidence that the bug was exploited.
“We recommend that customers change the administrator password for the router web interface to mitigate this vulnerability,” PenTest Partners said in an advisory.
“We take the safety and security of our customers very seriously. After being alerted to the risk, we began work on finding a remedy for the problem and we can confirm that a fix has been delivered to all Sky-manufactured products,” Sky said in a statement.
The company said the roughly 1 percent of customers who use routers not manufactured by Sky can ask for these to be replaced free of charge.
DNS rebinding attack
Pen Test Partners said the flaw could have made the routers susceptible to a DNS rebinding attack, carried out by luring the user to a malicious website via a phishing email.
The attack could have been used to hijack the user’s online traffic, the firm said.
The vulnerable routers were Sky Hub, Sky Hub 2, Sky Hub 3, Sky Hub 3.5 and Booster 3. Sky Hub 4 and Booster 4 were also susceptible, but used randomly generated passwords, making attacks more difficult.
In May a Which? investigation found that millions of older routers could no longer receive security updates, but remained in use, making them vulnerable to attacks.