Top Qs
Timeline
Chat
Perspective

SpeedTouch

Brand name of a line of networking equipment From Wikipedia, the free encyclopedia

SpeedTouch
Remove ads

SpeedTouch (originally Speed Touch) is a discontinued product line of customer-premises equipment that was initially produced by Alcatel and later by Thomson Multimedia. It includes ADSL and ADSL2+ modems, residential gateways, wireless access equipment, VoIP handsets and SHDSL equipment for interconnections.

Quick Facts Manufacturer, Type ...
Remove ads

History

In June 2001, a memorandum of understanding was signed between Alcatel and Thomson Multimedia to sell the DSL business for 456 million euros paid in new shares to Thomson.[1][2] The SpeedTouch brand was discontinued by in 2009 when the devices were rebranded as "Thomson Gateway".

Models

Summarize
Perspective
More information Picture, Model ...
Remove ads

Security

Summarize
Perspective

SpeedTouch gateways have been criticized because the algorithm used by the manufacturer to set both the default SSID and the corresponding WEP/WPA-PSK/WPA2-PSK passwords was very easily compromised, meaning that wireless access to SpeedTouch models that still use the default password is easily possible.[16]

In 2002 San Diego Supercomputer Center of the University of California reported their testing of Alcatel SpeedTouch devices that identified multiple security issues. They said:[17]

Researchers associated with the San Diego Supercomputer Center at the University of California, San Diego have identified multiple implementation flaws in the Alcatel Speed Touch ADSL "modem" (actually an ADSL-Ethernet router/bridge). These flaws can allow an intruder to take complete control of the device, including changing its configuration, uploading new firmware, and disrupting the communications between the telephone central office providing ADSL service and the device.


These flaws allow the following malicious actions:

  • changing the device's configuration such that the device can no longer be accessed;
  • disabling the device, either temporarily or permanently (requiring return of the device to the manufacturer); and
  • installation of malicious code, such as a network sniffer to gather local LAN traffic (that is not being bridged) and making the box more easily/covertly remotely accessible.

One of the more interesting discoveries was a cryptographic challenge-response back door that completely bypasses any password that a user may have set on the device.[17]

References

Loading related searches...

Wikiwand - on

Seamless Wikipedia browsing. On steroids.

Remove ads