Trend Micro recently gathered and published new vulnerability scan data on Internet of Things (IoT) devices such as home routers and Wi-Fi devices that could be vulnerable to malware threats such as VPNFilter.
The results are not good from a home or small business security perspective.
The scan data from June 1 to July 12 shows that many devices (34% of home networks) are still running older firmware versions, many still running at least one of 19 different malware-exploitable vulnerabilities. Approximately 9 percent of the affected devices with vulnerabilities can be exploited by VPNFilter.
In early May, Cisco’s Talos security team provided new research on the VPNFilter threat that affected 500K networking devices worldwide. At that time, Talos said that impacted devices included Linksys, MikroTik, NETGEAR and TP-Link networking equipment for small/home offices and also QNAP network-attached storage (NAS) devices.
In June, Talos reported VPNFilter expanded its target list to ASUS, D-Link, Huawei, Ubiquiti, UPVEL, and ZTE devices.
Users are strongly encouraged to upgrade their home and business network devices to protect their systems and organization from VPNFilter and other forms of malware threats.