View on GitHub

IoPT App

We are here to improve the SoHo security a bit!

Get it on Google Play

The CallStranger vulnerability that is found in billions of UPNP devices can be used to exfiltrate data (even if you have proper DLP/border security means) or scan your network or even cause your network to participate in a DDoS attack.

The vulnerability – CallStranger – is caused by Callback header value in UPnP SUBSCRIBE function can be controlled by an attacker and enables an SSRF-like vulnerability which affects millions of Internet facing and billions of LAN devices. This vulnerability can used for:

Because this is a protocol vulnerability, it may take a long time for vendors to provide patches.

Recommendations

Home users are not expected to be targeted directly. If their internet facing devices have UPnP endpoints, their devices may be used for DDoS source. Ask your ISP if your router has Internet facing UPnP with CallStranger vulnerability -there are millions of consumer devices exposed to Internet. Don’t port forward to UPnP endpoints. Home users don’t need to disable UPnP for this vulnerability. They just need to be sure UPnP endpoint is not exposed to Internet.

References

CVE-2020-12695