Security Alert – CSRF Vulnerability and how to Prevent Attacks
In May 2018 DrayTek became aware of CSRF (Cross-Site Request Forgery) attacks against web-enabled devices, including DrayTek routers.
In some circumstances, it may be possible for an attacker to intercept or create an administration session and change settings on the router. Initial reports show that in some cases DNS settings are altered.
To check if your router has been compromised, look at the DNS and DHCP settings on your router. If you have a router supporting multiple LAN subnets, check the settings for each subnet. Your DNS settings should be either blank, set to the correct DNS server addresses from your ISP, or DNS server addresses of a server which you have set (e.g. Google 22.214.171.124).
If you see a rogue DNS server setting of 126.96.36.199 or changed DHCP settings– it means that your router settings have been changed. In this case you can correct the changes or restore the router configuration from the last good known backup configuration. Note that the IP address 188.8.131.52 may not be the only rouge address and so, if you find any DNS IP that is different to your own setting, you should either upgrade the firmware or adjust security settings as described below.
DrayTek has now released new firmware that addresses this security vulnerability. The firmware can be downloaded from: https://www.draytek.com/en/download/firmware/
If you are unable to, or opt not to, update the firmware, it is recommended that you check and adjust the security settings as shown below to prevent a possible attack.
1. Upgrade to the latest firmware
2. Enable Auto Logout
3. Disable SSL VPN service if it is not used.
4. Disable “Allow Management from the Internet” if it is not required.
5. If remote management from the Internet is required, enable the following settings:
-IP Access List
-Do not use default port
-Enable Brute Force Protection