Categories: DDOSSecurity News

Hackers Use Old UPnP Protocol Exploit to Launch Heavy Bandwidth DDoS Attacks

Attackers could use the UPnP protocol exploit to bypass the DDoS mitigation solutions and to perform a heavy DDoS amplification attack. Imperva published a proof of concept (PoC) and the mitigations to be carried out for DDoS amplification attacks.

UPnP(Universal Plug and Play) works over UDP port 1900 that enabled by default on many IoT devices and it is always recommended to disabling UPnP due to a number of security concern over years. Business can estimate the cost and Probability of a DDoS Attack with DDoS downtime cost calculator.

During the attack, researchers noticed the packet was from unexpected source rather than UDP/1900 and after working with a number of possibilities they reproduced the attack by creating a PoC for a UPnP-integrated attack method that obfuscates the source details of the amplification payload.

Attackers can locate an open UPnP router with SSDP(Simple Service Discovery Protocol) through shodan scans, according to researchers the wide scan for “rootDesc.xml” yielded 1.3 million results. Which mean’s all the devices are not vulnerable, but attackers can locate the vulnerable routers easily.

Then in the next step attackers try accessing the XML file “rootDesc.xml” and modify the port forwarding rules to mask the source port of DDoS attack to be from random ports.

UPnP protocol exploitUPnP protocol exploit

The PoC provided by Imperva shows attackers can use the UPnP devices to obfuscate the data from the source port of amplification payloads and it is not limited with DNS amplification also with SDP, DNS, and NTP attacks.

Researchers said, “With source IP and port information no longer serving as reliable filtering factors, the most likely answer is to perform deep packet inspection (DPI) to identify amplification payloads.”

Github Hits with a record-breaking DDoS attack, the Memcached amplification attack peaked up to 1.35Tbps via 126.9 million packets per second.

Business can find and implement the best DDoS attack protection tools to away from cybercriminals and keep safe and secure your organizations.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to disrupt…

1 day ago

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code execution…

1 day ago

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile…

1 day ago

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular application…

1 day ago

EU Targets Stark Industries in Cyberattack Sanctions Crackdown

The European Union has escalated its response to Russia’s ongoing campaign of hybrid threats, announcing…

1 day ago

Venice.ai’s Unrestricted Access Sparks Concerns Over AI-Driven Cyber Threats

Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself as…

1 day ago