VPNFilter Malware Audit

Find All Network Devices Vulnerable to the VPNfilter Malware

Discover all network devices vulnerable to the VPNFilter malware. Based on the information from multiple sources, routers from Linksys, MikroTik, Netgear, and TP-Link, as well as QNAP network-attached storage (NAS) devices are vulnerable to this malware. The report provides an overview of these devices so that you can check whether your firmware versions are up-to-date.

VPNFilter Malware

Click to Open - VPNFilter Malware Query
Select Top 1000000 tblAssets.AssetID,
tblAssets.AssetName,
tblAssets.Description,
tblAssets.IPAddress,
tsysIPLocations.IPLocation,
tblAssetCustom.Manufacturer,
tblAssetCustom.Model,
tblAssets.Lastseen,
tblAssets.Lasttried
From tblAssets
Inner Join tblAssetCustom On tblAssets.AssetID = tblAssetCustom.AssetID
Inner Join tsysAssetTypes On tsysAssetTypes.AssetType = tblAssets.Assettype
Inner Join tsysIPLocations On tsysIPLocations.LocationID =
tblAssets.LocationID
Inner Join tblState On tblState.State = tblAssetCustom.State
Where (tblAssetCustom.Manufacturer In ('Linksys', 'Mikrotik', 'Netgear',
'TP-Link') And tsysAssetTypes.AssetTypename = 'Router') Or
(tblAssetCustom.Manufacturer Like '%QNAP%' And tsysAssetTypes.AssetTypename =
'NAS')
Order By tblAssets.AssetName

Audit and Take Action in 3 Easy Steps

Download-Install-Lansweeper

1. Download & Install Lansweeper

Save-and-Run-the-Report

3. Run the Audit & Take Action

Download Lansweeper to Run this Audit

Harness the Power of Reporting