You may have heard recently about the latest router vulnerability that has been widely reported called the Misfortune Cookie. Another catchy name for another nasty router bug that may effect up to 12 million routers currently in use. Here is what you need to know.
What is the Misfortune Cookie?
“vulnerability is due to an error within the HTTP cookie management mechanism present in the affected software, allowing an attacker to determine the ‘Fortune’ of a request by manipulating cookies. Attackers can send specially crafted HTTP cookies that exploit the vulnerability to corrupt memory and alter the application state. This, in effect, can trick the attacked device to treat the current session with administrative privileges – to the misfortune of the device owner.”
What Routers Are Affected by the Misforunte Cookie?
The next question is of course does the Misfortune Cookie affect your router? Currently, 200+ models affected include routers made by many manufacturers including D-Link (not their first recently), Edimax, Huawei, TP-Link, ZTE, and ZyXEL. The majority of these are standard residential gateway routers. Find out if your router is potentially affected by downloading the full list from CheckPoint.
How Can The Misfortune Cookie Affect You?
Since the Misfortune Cookie affects the source of your Internet sharing that means “any device connected to it – including computers, phones, tablets, printers, security cameras, refrigerators, toasters or any other networked device in your home or office network – may have increased risk of compromise.”
The Misfortune Cookie is unique due to its severity, ease of how it can be done and the sheer volume of vulnerable devices. CheckPoint considers it a “game-changing wake-up call for the embedded device industry and consumers alike, highlighting the importance of increased security and privacy for consumer and enterprise networks.”
If an attacker chooses to exploit the Misfortune Cookie, they will be able to “easily monitor your Internet connection, steal your credentials and personal or business data, attempt to infect your machines with malware.”
Open Source Firmware As a Router Bug Solution
Tired of dealing with all these bugs? Then a truly upgraded router solution might be in order.
Would you rather trust a manufacturer who only cares about a product for a year after they release it or leave it to hardworking individuals focused on giving the best router performance and features for themselves to use and to share with others.
Is DD-WRT Firmware Susceptible to the Misfortune Cookie?
This was swiftly answered with a NO via multiple locations including the DD-WRT Forum.
The Misfortune Cookie vulnerability comes from the RomPager SDK which DD-WRT does not utilize. DD-WRT uses lighttpd. Still it is not recommended to enable any webserver/services on the WAN side.
According to our reserach this is also the case with the variations of Tomato firmware including TomatoUSB.
Best Open Source Firmware Routers
With the frequency of recent vulnerabilities (Shellshock, Cryptobug, the Netgear bug) it seems router manufacturers refuse to update for, then it might just be time to update to open-source firmware like DD-WRT, TomatoUSB, OpenWRT or pfsense. All of these firmwares dealt with this issues pretty much from the start and are community vetted and tested to prevent these issues.
FlashRouters preinstalls the stress-tested, alternative firmware like DD-WRT and Tomato on every router before it ships. We are a one stop shop for solving for these continual issues while gaining premium stability, superior performance and exceptional security options like VPN. All FlashRouters include customized setup guides and hands-on tech support from true networking professionals.
Not sure router is best for you? Contact our helpful FlashRouters Team!