![]() | |
SpeedTouch 585v6 with wireless antenna | |
Manufacturer |
|
---|---|
Type | Customer-premises equipment |
Website | speedtouch.com at the Wayback Machine (archived 2006-08-27) |
SpeedTouch (originally Speed Touch) is a line of customer-premises equipment that was initially produced by Alcatel and later by Thomson Multimedia. It includes ADSL and ADSL2+ modems, residential gateways, wireless access equipment, VoIP handsets and SHDSL interconnect equipment. They are a major brand in home and business networking products.
In June 2001, a memorandum of understanding was signed between Alcatel and Thomson Multimedia to sell the DSL business for 456 million euros paid in new shares to Thomson. [1] [2] The SpeedTouch brand was discontinued by in 2009 when the devices were rebranded as "Thomson Gateway".
Following is a non-exhaustive list of existing SpeedTouch models:
SpeedTouch gateways have been criticized because the algorithm used by the manufacturer to set both the default SSID and the corresponding WEP/WPA-PSK/WPA2-PSK passwords was very easily compromised, meaning that wireless access to SpeedTouch models that still use the default password is easily possible. [29]
In 2002 San Diego Supercomputer Center of the University of California reported their testing of Alcatel SpeedTouch devices that identified multiple security issues. They said: [30]
Researchers associated with the San Diego Supercomputer Center at the University of California, San Diego have identified multiple implementation flaws in the Alcatel Speed Touch ADSL "modem" (actually an ADSL-Ethernet router/bridge). These flaws can allow an intruder to take complete control of the device, including changing its configuration, uploading new firmware, and disrupting the communications between the telephone central office providing ADSL service and the device.
These flaws allow the following malicious actions:
- changing the device's configuration such that the device can no longer be accessed;
- disabling the device, either temporarily or permanently (requiring return of the device to the manufacturer); and
- installation of malicious code, such as a network sniffer to gather local LAN traffic (that is not being bridged) and making the box more easily/covertly remotely accessible.
One of the more interesting discoveries was a cryptographic challenge-response back door that completely bypasses any password that a user may have set on the device. [30]