A wireless device exploit uncovered 11 years ago still hasn't been fixed by some manufacturers — six vendors and 24 devices found harbouring vulnerable firmware across routers, range extenders, and more

A broken lock on a PCB.
(Image credit: Shutterstock)

NetRise has revealed (PDF) that wireless devices from several manufacturers remain vulnerable to the Pixie Dust exploit disclosed in 2014, even though companies have had over a decade to harden their products against the well-known security flaw.

"Across six vendors, we found 24 devices, including routers, range extenders, access points, and hybrid Wi-Fi/powerline products, with firmware that was released vulnerable to Pixie Dust," NetRise said. "The oldest vulnerable firmware in the set dates to Sept. 2017, nearly three years after public disclosure of the Pixie Dust exploit. On average, vulnerable releases occurred 7.7 years after the exploit was first published."

This means six manufacturers released products with known vulnerabilities and, in many cases, have neglected to update the relevant firmware even though their customers have been assured the products are still being supported. Even the products that received patches did so long after the fact—NetRise said on average Pixie Dust patches arrived 9.6 years after the exploit's public disclosure.

Follow Tom's Hardware on Google News, or add us as a preferred source, to get our up-to-date news, analysis, and reviews in your feeds. Make sure to click the Follow button!

Nathaniel Mott
Freelance News & Features Writer

Nathaniel Mott is a freelance news and features writer for Tom's Hardware US, covering breaking news, security, and the silliest aspects of the tech industry.

  • DS426
    Funny as it seems like disabling WPS was never removed as a Wi-Fi hardening control. Unfortunately, that's the 0.01 percenters that do that at home. That rate is much higher for enterprises.
    Reply
  • das_stig
    Why are the manufacturers not being named and shamed for failing to update, or government regulatory action taken against them? Industry protecting themselves?
    Reply
  • Dennyy
    No offense, but would it be hard to name those 6 vendors and 24 devices? Nothing pisses me more than some clickbait that leads to nowhere.

    By the way to save some time - they're not even mentioned in the original NetRise pdf...at least nothing except TP-Link in general. They're probably waiting for some idiot to pay for the results, like everyone always does.
    Reply
  • DS426
    das_stig said:
    Why are the manufacturers not being named and shamed for failing to update, or government regulatory action taken against them? Industry protecting themselves?
    Right!? This tells me that they are still under the responsible disclosure window. This approach makes sense (give a heads-up early on and then list specific vendors, models, etc. later) to allow end users time to patch, but in this case, there's little reason to believe that this vulnerability will get patched by vendors on older models at this point.

    There's no real consequences for not releasing a software vulnerability patch for vendors operating in the U.S., at least not in regulatory terms. If a vuln was severe enough and could be proven to cause huge damages, it could be pursued in civil court, or maybe even criminal court if it resulted in a significant loss of life, e.g. medical machines in the healthcare industry. CISA mandates critical sectors and government to apply available patches or stop using the product or device, but that's a different matter.
    Reply