Notified: December 13, 2012 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: April 05, 2013
Affected
Axis products included version 1.6.17 (or earlier) of the libupnp library. UPnP is enabled by default and is mainly used for discovery and NAT configuration. All releases prior to 5.50.2 are affected by this vulnerability except for the AXIS P135x-series where the correction was released in the latest 5.40.19.
All Axis products running firmware verisons prior to 5.5x are potentially affected. Axis included the latest version 1.6.18 of UPnP in order to address the vulnerability and it will be available in release 5.50.2 or later. For prior releases, users are recommended to turn off UPnP (Available under System Options/Network/UPnP)
Notified: December 13, 2012 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: January 29, 2013
Affected
Cisco is investigating this issue for potential impact to Cisco and Linksys products. Please consult our public documents on this issue here: Cisco's Security Advisory: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp Linksys Knowledge Base article: http://homekb.cisco.com/Cisco2/ukp.aspx?vw=1&articleid=28341
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: January 31, 2013
Affected
January 30, 2013 UPDATE: At the current time D-Link deploys firmware that has UPnP feature support on our devices. The UPnP features are enabled by software developer kits - Intel, Portable, and miniUPnP. Recently, it has been discovered that the following UPnP versions may have a security vulnerability that could cause devices to become unstable, impair functionality, or disclose the services the devices offers (i.e. network camera feed): All Versions of Intel SDK Version of Portable SDK prior to V. 1.6.18 Version of MiniUPnP SDK prior to V. 1.1 Security and performance is of the utmost importance to D-Link across all product lines, including networking, surveillance, storage and entertainment solutions. The company is currently assessing the recent findings surrounding UPnP technology and whether any D-Link products are susceptible to vulnerabilities. If any action is needed, D-Link will provide information online at www.dlink.com/upnp
Customers that want to disable UPnP in the affected products can do so by following these steps: Current Solution for Affected Products by Disabling UPnP Step 1: Log into device wed configuration - For routers default URL http://dlinkrouter.local or http://192.168.0.1 Step 2: Click on the Advanced tab at the top and then click on Advanced Network on the left-hand side. Step 3: Under the UPnP Settings section, uncheck the disabled UPnP buttons to disable UPnP on the device Step 4: Click Save Settings at the top to apply the settings. *** Please note that disabling UPnP might adversely affect features and capabilities of the device and/or supporting applications or devices connecting to these products.
Notified: December 13, 2012 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 10, 2013 Updated: January 29, 2013
Affected
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 11, 2013 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: January 29, 2013
Affected
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: February 01, 2013 Updated: February 01, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
Notified: January 08, 2013 Updated: February 01, 2013
Statement Date: January 31, 2013
Affected
No statement is currently available from the vendor regarding this vulnerability.
IPitomy Communications Response to CERT VU#922681 1/31/2013 Summary The Software Developer Kit (SDK) for Universal Plug-n-Play (UPnP) Devices contains a library originally developed as the Intel SDK for UPnP Devices. Multiple stack-based buffer overflow vulnerabilities have been found in the popular versions of this library used on many network vendor devices. For more information on this vulnerability please visit: http://www.kb.cert.org/vuls/id/922681 Affected Products IPitomy has not confirmed the vulnerability yet and is still investigating. However we are listing below the only products that could be affected as well as the recommended steps to prevent any potential exploitation of these vulnerabilities. IP1000 and IP1000v2 These products contain an affected version of the UPnP library. IPitomy recommends disabling UPnP permanently on these products. This product defaults the UPnP setting to “on”. Note we have scanned the IP1000 products from the WAN side and have determined that with the UPnP service on, the systems do not respond to UPnP requests from the WAN, therefore exploitation of these UPnP vulnerabilities would have to occur from the LAN side of the device. IPR20 IPR20 contains router functionality. The UPnP service is disabled by default on these devices. IPitomy recommends that you ensure that UPnP service is disabled. IPitomy has confirmed that if UPnP service is enabled the device does not respond to UPnP requests on the WAN interface, therefore exploitation of these UPnP vulnerabilities would have to occur through the LAN side of the device. Properly installed (IPR20 WAN port connected to customer LAN), devices should not present these vulnerabilities.
Notified: January 10, 2013 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: January 29, 2013
Affected
Cisco is investigating this issue for potential impact to Cisco and Linksys products. Please consult our public documents on this issue here: Cisco's Security Advisory: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130129-upnp Linksys Knowledge Base article: http://homekb.cisco.com/Cisco2/ukp.aspx?vw=1&articleid=28341
We are not aware of further vendor information regarding this vulnerability.
Notified: January 04, 2013 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: January 29, 2013
Affected
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 16, 2013 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 04, 2012 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 04, 2013 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: January 30, 2013
Affected
No statement is currently available from the vendor regarding this vulnerability.
From SSA-963338: Siemens OZW and OZS products use the UPnP network protocol for supporting specific localization functions. The 3rd party library libupnp [1] used for this protocol is vulnerable to multiple stack-based buffer overflows, as reported by CERT-CC [2]. These vulnerabilities allow DoS attacks and possibly remote code execution if the affected network ports are reachable by an attacker. Siemens plans to provide official permanent fixes with upcoming firmware updates and product replacements, and describes a temporary workaround below. The full advisory can be found at the URL below.
Notified: January 04, 2013 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 04, 2013 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: January 30, 2013
Affected
The following Sony products are affected by this vulnerability. Please access the links below for more details. Multi Channel AV Receiver : STR-DA3700ES, STR-DA5700ES [STR-DA5700ES] in USA: http://esupport.sony.com/US/p/news-item.pl?mdl=STRDA5700ES&news_id=461 in Canada: http://esupport.sony.com/CA/p/news-item.pl?mdl=STRDA5700ES&news_id=461 in Europe(UK): http://www.sony.co.uk/support/en/product/STR-DA5700ES/news/STR_DA_HN [STR-DA3700ES] in USA: http://esupport.sony.com/US/p/news-item.pl?mdl=STRDA3700ES&news_id=461 in Canada: http://esupport.sony.com/CA/p/news-item.pl?mdl=STRDA3700ES&news_id=461 in Europe(UK): http://www.sony.co.uk/support/en/product/STR-DA3700ES/news/STR_DA_HN
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: February 28, 2013
Affected
Synology products employ version 1.6.6 of the libupnp library for the following features: Video Station, Audio Station, Media Server, Surveillance Station, and EZ-Internet (UPnP router discovery). All versions of DSM prior to DSM 4.2 are affected by this vulnerability. However, the vulnerability issue will be resolved in the official release of DSM 4.2, planned in March 2013.
To avoid being affected by this vulnerability, users are recommended to do the following: * Deploy firewall rules to block untrusted hosts from being able to access port 1900/UDP. * Update to DSM 4.2 when it is officially released. Users could also consider turning off UPnP features for the following applications: * Video Station: Stop running Video Station. * Audio Station: Turn off UPnP in the settings. * Media Server: Stop running Media Server. * EZ-Internet: Do not configure routers with EZ-Internet. * Surveillance: Do not add IP cameras by searching IP cams on LAN in Surveillance Station.
Updated: February 05, 2013
Not Affected
| Teldat Security Bulletin | Bulletin ID: 2013-02-04 Revision: 1.0 Title: Portable SDK for UPnP Devices (libupnp) contains multiple buffer overflows in SSDP (US-CERT Vulnerability Note VU#922681) Summary: US-CERT Note VU#922681 describes that the "Portable SDK for UPnP Devices libupnp" library contains multiple buffer overflow vulnerabilities. Devices that use "libupnp" may also accept UPnP queries over the WAN interface, therefore exposing the vulnerabilities to the internet. A remote, unauthenticated attacker may be able to execute arbitrary code on the device or cause a denial of service. Details can be found at http://www.kb.cert.org/vuls/id/922681 and https://community.rapid7.com/docs/DOC-2150 Comment: The UPnP implemention used in the BOSS operating system is a proprietary solution developed by Teldat, and no Teldat product running the BOSS operating system is affected. Note that products sold under the former company name of "Funkwerk Enterprise Communications" - if running the BOSS operating system - are equally not affected by this vulnaerablity. Copyright (c) 2013, Teldat GmbH. All Rights Reserved ----- End Security Bulletin 2013-02-04 -----
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 04, 2013 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 09, 2013 Updated: January 29, 2013
Statement Date: January 10, 2013
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 04, 2012 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: January 10, 2013 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Updated: February 01, 2013
Not Affected
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2012 Updated: January 29, 2013
Unknown
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.