<img height="1" width="1" src="https://www.facebook.com/tr?id=3323484487762706&amp;ev=PageView&amp;noscript=1">
Security in Seconds

Security In Seconds: Is Your Wireless Network Secure? Firmware Considerations

Apr 29, 2021
New call-to-action

Recent Content

How secure is the firmware you're getting from your vendor?

What are the risks? Most companies believe that updating firmware will optimize performance and they simply trust the firmware vendors are supplying. Malware can easily be hidden within firmware, especially when not secured by cryptographic signature, allowing it to easily be hacked. The vendor may also include outdated or vulnerable binaries or packages that are necessary for the services provided by the firmware but may open up vulnerabilities. Vulnerable device firmware may allow an attacker illegitimate access to your network or other nodes or computers attached to the network. It may also be possible for an attacker to decrypt, view, and manipulate network traffic, among other potentially dangerous actions.

How do I prevent it? SONAR is a subscription service that identifies wireless network threats and vulnerabilities. Sonar has many alerts, one of which specifically detects firmware security weaknesses.

Pulsar Security can determine - through reverse engineering your access point’s firmware - whether the firmware has vulnerabilities that could be used to compromise your network, and if the surface risk is higher or lower with an upgrade.

Schedule a demo of Sonar’s full alert suite today!


Steve Steinberg

Steve Steinberg

Steve is a Security Consultant and leads DevOps Engineering at Pulsar Security. Steve values continued education and development, having earned Network+, Security+, GIAC Security Essentials, GIAC Python Coder, GIAC Penetration Tester, GIAC Web App Penetration Tester, and Offensive Security Certified Professional (OSCP) certifications.