Saw an article recently about a rash of attacks on UBNT networks, specifically Airmax CPE devices, that culminated in this blog post on the UBNT blog:
http://community.ubnt.com/t5/airMAX-Updates-Blog/Important-Security-Noti...
Near as I can understand, once a device is flashed with AREDN, the vulnerability is removed, but wondered if anyone had any concerns about this kind of thing? Frankly, I didn't know these devices were even targets for this kind of stuff. Guess I'm kind of naive.
http://community.ubnt.com/t5/airMAX-Updates-Blog/Important-Security-Noti...
Near as I can understand, once a device is flashed with AREDN, the vulnerability is removed, but wondered if anyone had any concerns about this kind of thing? Frankly, I didn't know these devices were even targets for this kind of stuff. Guess I'm kind of naive.
Our local WISP just learned this lesson the hard way. They had a system wide outage that required them to re-program every tower radio and every consumer radio (hundreds of radios). While they have never shared the root cause, speculation is that they were hit by one of these attacks. Once the attackers were into the core network, they started changing the SSIDs of radios making them unreachable remotely. I would guess that the WISP used the same user and password on every single radio.
Evil is everywhere.