Head blueLogoText.gif NCF HelpWiki
Help | StartPage

Difference between revisions of "Template:Misfortune Cookie Upgrade Firmware"

From Support
Jump to: navigation, search
m (⚠ Vulnerable to Misfortune Cookie: Avoid/Replace ⚠)
m
Line 1: Line 1:
= ⚠ Vulnerable to Misfortune Cookie: Avoid/Replace ⚠ =
+
= ⚠ Vulnerable to Misfortune Cookie: Upgrade Firmware ⚠ =
 
In December 2014 it was revealed that some versions of this TP-Link model are subject to hacking if they are running outdated firmware and if the remote access (ACL) is set to allow remote access. We documented this vulnerability on the [[Misfortune Cookie Vulnerability]] page.  
 
In December 2014 it was revealed that some versions of this TP-Link model are subject to hacking if they are running outdated firmware and if the remote access (ACL) is set to allow remote access. We documented this vulnerability on the [[Misfortune Cookie Vulnerability]] page.  
  

Revision as of 11:20, 26 September 2019

⚠ Vulnerable to Misfortune Cookie: Upgrade Firmware ⚠

In December 2014 it was revealed that some versions of this TP-Link model are subject to hacking if they are running outdated firmware and if the remote access (ACL) is set to allow remote access. We documented this vulnerability on the Misfortune Cookie Vulnerability page.

Read more on the Misfortune Cookie as reported in http://www.kb.cert.org/vuls/id/561444.

NCF Recommendation for this modem:

  • Upgrade the Firmware to the lastest version if available.
  • Also, Deactivate ACL from Access ManagementACL.
  • If there is no firmware update for your version, replace the modem.