I just came across this article recently and was really shocked to find out that:
- Unifi installs a user account in the router that allows remote access by TM staff
- This remote access login was the same for ALL Unifi users (now rectified). This basically means that anybody with the login, could potentially gain access to your router
- This was not made known to TM users.
- You can actually use your own router if you know how to configure it. The reason why they require you to get THEIR router is so they have this remote access user installed.
The ramifications of these are serious and possibly if this was done in any developed nation, there would have already been legal suits:
- Turn your router into a proxy, if he commits any crimes online it will be traced back to you instead and you will take the fall for it
- Use your 10/20mbps Unifi account so he doesn’t have to pay for his
- Use up your bandwidth quota (once quotas are implemented) as much as he wants and you will pay for it
- ‘Spy’ on your Internet connection and view every site you are visiting
- Forward all connections to your home PC using DMZ, making your home PC completely vulnerable to Internet attacks.. if you have an open NAS (network attached storage) on your home network, he will be able to access all your files
TM has now posted an announcement on this where they have given everyone a unique password for the remote access login instead of having the same password throughout but yet still recommends that remote access remain enabled for ‘technical support issues’.
Telekom Malaysia Berhad (TM) wishes to clarify the concerns raised by various parties with regards to the remote accessibility of UniFi routers which are part of the customer premises equipment (CPE) for all UniFi subscribers.
TM would like to assure all concerned parties that the only reason the UniFi router setting for remote access is enabled is for remote access troubleshooting purposes for the express use of our technical support personnel. In the event there is a technical support issue with any of our UniFi subscribers; at the first level of troubleshooting, TM’s network operation centre (NOC) can immediately remotely diagnose the problem before sending a support team on-site.
TM takes note of the security concerns that have been raised, and we have taken these issues to heart.
TM also acknowledges that there is a need to balance the public’s level of comfort with regards to security and privacy and TM’s own commitment to faster support turnaround time. As such, TM would like to maintain the higher level of service enabled by remote access management on customer routers, and in recognition of that TM will immediately change every UniFi customers’ router management password into a high security, unique one (which will be only known to the customer and TM). TM will notify all our Unifi customers of this change accordingly.
This is simply despicable and utterly unacceptable behaviour. Take heed and disable your remote access management accordingly.
You can do so by unticking remote management and if you have a firewall on it, block all the ports (TCP 22/23/80/8080/443) from WAN access.
Thanks to rizvanrp and everyone else who brought this issue to light.