Top Qs
Timeline
Chat
Perspective
SpeedTouch
Brand name of a line of networking equipment From Wikipedia, the free encyclopedia
Remove ads
SpeedTouch (originally Speed Touch) is a discontinued product line of customer-premises equipment that was initially produced by Alcatel and later by Thomson Multimedia. It includes ADSL and ADSL2+ modems, residential gateways, wireless access equipment, VoIP handsets and SHDSL equipment for interconnections.
Remove ads
History
In June 2001, a memorandum of understanding was signed between Alcatel and Thomson Multimedia to sell the DSL business for 456 million euros paid in new shares to Thomson.[1][2] The SpeedTouch brand was discontinued by in 2009 when the devices were rebranded as "Thomson Gateway".
Models
Summarize
Perspective
Remove ads
Security
Summarize
Perspective
SpeedTouch gateways have been criticized because the algorithm used by the manufacturer to set both the default SSID and the corresponding WEP/WPA-PSK/WPA2-PSK passwords was very easily compromised, meaning that wireless access to SpeedTouch models that still use the default password is easily possible.[16]
In 2002 San Diego Supercomputer Center of the University of California reported their testing of Alcatel SpeedTouch devices that identified multiple security issues. They said:[17]
Researchers associated with the San Diego Supercomputer Center at the University of California, San Diego have identified multiple implementation flaws in the Alcatel Speed Touch ADSL "modem" (actually an ADSL-Ethernet router/bridge). These flaws can allow an intruder to take complete control of the device, including changing its configuration, uploading new firmware, and disrupting the communications between the telephone central office providing ADSL service and the device.
These flaws allow the following malicious actions:
- changing the device's configuration such that the device can no longer be accessed;
- disabling the device, either temporarily or permanently (requiring return of the device to the manufacturer); and
- installation of malicious code, such as a network sniffer to gather local LAN traffic (that is not being bridged) and making the box more easily/covertly remotely accessible.
One of the more interesting discoveries was a cryptographic challenge-response back door that completely bypasses any password that a user may have set on the device.[17]
References
External links
Wikiwand - on
Seamless Wikipedia browsing. On steroids.
Remove ads