Incident: Outdated Routers Pose Security Risks to Millions of Users

Published Date: 2021-05-05

Postmortem Analysis
Timeline 1. The software failure incident of outdated routers putting millions at security risk was reported on May 5, 2021, in Article 114249.
System 1. Routers provided by internet-service companies such as EE, Sky, and Virgin Media 2. Specific router models with flaws: - Sky SR101 and SR102 - Virgin Media Super Hub and Super Hub 2 - TalkTalk HG635, HG523a, and HG533 - Several routers from BT, including the Home Hub 3B, 4A, and 5B - Plusnet's Hub Zero 270N [114249]
Responsible Organization 1. Internet service providers (ISPs) such as EE, Sky, and Virgin Media were responsible for causing the software failure incident by providing outdated routers with flaws that put users at risk of being hacked [114249].
Impacted Organization 1. Internet users using outdated routers, potentially millions [114249]
Software Causes 1. Weak default passwords on most of the routers, making them vulnerable to cyber-criminals [114249] 2. Lack of firmware updates on the routers, leading to security and performance issues [114249] 3. Network vulnerability with EE's Brightbox 2, which could give a hacker full control of the device [114249]
Non-software Causes 1. Lack of firmware updates: The routers were found to have a lack of firmware updates, which are important for security and performance [114249].
Impacts 1. Millions of people were at risk of being hacked due to using outdated routers with flaws, including weak default passwords and lack of firmware updates [114249].
Preventions 1. Ensuring timely firmware updates for routers to address security vulnerabilities [114249] 2. Implementing strong default passwords on routers to prevent easy hacking [114249] 3. Enforcing legislation to ban default passwords on devices [114249] 4. Providing clear information to customers on the duration of security software updates for their devices [114249] 5. Establishing a public point of contact for reporting vulnerabilities in devices [114249]
Fixes 1. Implementing firmware updates for the routers to address security vulnerabilities [114249] 2. Enforcing the use of strong, unique passwords instead of weak default passwords on the routers [114249] 3. Legislation to ban default passwords on devices and require manufacturers to disclose the duration of security software updates for their devices [114249]
References 1. Which? - The consumer watchdog organization provided information on the outdated routers and security risks [114249]. 2. Virgin Media - Virgin Media responded to the findings of the research conducted by Which? [114249]. 3. BT - BT, which owns EE, also responded to the research findings and provided information on the security of their routers [114249]. 4. TalkTalk - TalkTalk commented on the research findings and the proportion of routers affected [114249]. 5. Vodafone - Vodafone provided information on the router examined by Which? and the updates for active customer subscriptions [114249]. 6. Pen Test Partners - Security consultant Ken Munro from Pen Test Partners shared insights on the security flaw in the routers [114249].

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to outdated routers and security risks has happened again at multiple organizations. The article mentions that the consumer watchdog found flaws in routers provided by internet-service companies such as EE, Sky, and Virgin Media, including weak default passwords and a lack of firmware updates [114249]. Additionally, the article highlights a network vulnerability with EE's Brightbox 2 that could give a hacker full control of the device, indicating a software failure incident within EE's products [114249]. (b) The software failure incident of outdated routers and security risks has also occurred at other organizations. The article mentions routers from various companies, including Sky, Virgin Media, and TalkTalk, that were found to be lacking in updates and security measures [114249]. This indicates that the issue of outdated routers and potential security vulnerabilities is not limited to a single organization but is a broader industry concern.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article. The routers examined by Which? were found to have flaws such as weak default passwords, lack of firmware updates, and network vulnerabilities [114249]. These issues point to a failure in the design phase where crucial security measures were not adequately implemented during the development or update of the systems. (b) The software failure incident related to the operation phase is also highlighted in the article. The article mentions that millions of people could be using outdated routers that put them at risk of being hacked due to factors like weak default passwords and lack of firmware updates [114249]. This indicates that the operation or misuse of the systems by users, such as not updating passwords or firmware, contributed to the security risks and potential failures.
Boundary (Internal/External) within_system, outside_system (a) The software failure incident related to outdated routers and security risks reported in Article 114249 falls within the system boundary. The failure was primarily due to factors originating from within the system, such as weak default passwords, lack of firmware updates, and network vulnerabilities within the routers provided by internet service companies like EE, Sky, and Virgin Media. These internal system issues contributed to the security risks faced by millions of users using outdated routers [114249]. (b) Additionally, external factors such as proposed legislation by the government to ban default passwords on devices and requirements for manufacturers to provide security update information and a point of contact for vulnerability reporting also play a role in addressing the software failure incident related to outdated routers [114249].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: The article reports that the routers examined by Which? had flaws such as weak default passwords and a lack of firmware updates, which are contributing factors introduced without human participation [114249]. (b) The software failure incident occurring due to human actions: The article mentions that the routers had weak default passwords set by manufacturers, indicating that human actions in setting up these default passwords contributed to the security risks [114249].
Dimension (Hardware/Software) hardware (a) The software failure incident occurring due to hardware: - The article highlights that millions of people could be using outdated routers that put them at risk of being hacked due to flaws in the hardware of the routers provided by internet-service companies like EE, Sky, and Virgin Media [114249]. - Specific hardware-related issues mentioned include weak default passwords that cyber-criminals could hack, a lack of firmware updates crucial for security and performance, and a network vulnerability with EE's Brightbox 2 that could give a hacker full control of the device [114249]. (b) The software failure incident occurring due to software: - The article does not explicitly mention any software-related failures as the primary cause of the incident. Instead, it focuses on hardware-related issues such as outdated routers, weak default passwords, lack of firmware updates, and network vulnerabilities [114249]. - Therefore, based on the information provided in the article, the software failure incident is primarily attributed to hardware-related factors rather than software-related factors.
Objective (Malicious/Non-malicious) malicious (a) The software failure incident reported in the articles is related to a malicious objective. The routers examined by Which? were found to have weak default passwords that cyber-criminals could hack, a lack of firmware updates crucial for security, and a network vulnerability in EE's Brightbox 2 that could give a hacker full control of the device. Additionally, Pen Test Partners security consultant Ken Munro mentioned a critical security flaw in routers that allowed for remote hijacking, indicating a malicious intent to exploit the system [114249].
Intent (Poor/Accidental Decisions) poor_decisions (a) The software failure incident related to the outdated routers and security risks highlighted in Article 114249 can be attributed to poor decisions. The routers provided by internet-service companies like EE, Sky, and Virgin Media were found to have flaws such as weak default passwords, lack of firmware updates, and network vulnerabilities. These issues indicate that the companies made poor decisions in terms of ensuring the security and performance of the routers provided to customers. Additionally, the delay in addressing critical security flaws despite being reported over a year ago reflects a lack of proactive decision-making in addressing potential risks and vulnerabilities [114249].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence is evident in the article. The routers provided by internet-service companies like EE, Sky, and Virgin Media were found to have flaws, including weak default passwords that cyber-criminals could hack, a lack of firmware updates crucial for security and performance, and a network vulnerability with EE's Brightbox 2 that could give a hacker full control of the device [114249]. This indicates a lack of professional competence in ensuring the security and integrity of the software and hardware components of these routers. (b) The accidental software failure incident is also highlighted in the article. For example, the article mentions that the routers examined by Which? had flaws such as weak default passwords and a lack of firmware updates, which could have been accidental oversights during the development and maintenance processes [114249]. Additionally, the article mentions that Pen Test Partners reported a critical security flaw to an ISP over a year ago, indicating that the failure to address the issue promptly could have been accidental or due to negligence [114249].
Duration permanent (a) The software failure incident related to outdated routers and security risks mentioned in Article 114249 can be considered as a permanent failure. This is because the routers identified with flaws, such as weak default passwords and lack of firmware updates, have been in that state for a significant period, with some devices not receiving updates since 2018 or earlier. The article also highlights the need for upcoming legislation to address issues like default passwords and security updates, indicating a systemic problem that has persisted over time [114249].
Behaviour crash, omission, other (a) crash: The article mentions a network vulnerability with EE's Brightbox 2, which could give a hacker full control of the device, indicating a potential crash scenario where the system loses control and fails to perform its intended functions [114249]. (b) omission: The article highlights that weak default passwords were found on most of the routers examined, indicating an omission in performing the intended security function of having strong passwords [114249]. (c) timing: There is no specific mention of a timing-related failure in the articles. (d) value: The article does not explicitly mention a failure due to the system performing its intended functions incorrectly. (e) byzantine: The article does not describe a failure due to inconsistent responses or interactions by the system. (f) other: The behavior of the software failure incident in this case could also be categorized as a security vulnerability, where the routers were found to have flaws such as weak default passwords and lack of firmware updates, exposing users to potential hacking risks [114249].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident related to outdated routers potentially put millions of people at risk of being hacked due to flaws in the routers. The routers had weak default passwords that cyber-criminals could exploit, a lack of firmware updates crucial for security and performance, and network vulnerabilities that could give hackers full control of the devices [114249]. This situation could lead to potential property damage or loss of data for individuals impacted by the security risks associated with the outdated routers.
Domain information (a) The software failure incident reported in the article [114249] is related to the information industry. The incident involves outdated routers provided by internet-service companies, which could put millions of people at risk of being hacked due to flaws such as weak default passwords and lack of firmware updates. This issue directly impacts the security and performance of the information networks accessed by users.

Sources

Back to List