 Tom here from Lauren systems, and I'm here to issue a correction regarding the Plex UPNP DDoS attack Plex reached out to me to correct something now too long didn't watch if you just want to know what the answer is UPNP was not a factor. This was kind of a Misconstrued from the net scout report that I then reiterated again So there's a chain of incorrect information and I don't like incorrect information. Therefore. This is the correction video essentially UPNP opens up TCP port 32 400 and that's it when you have UPNP enabled the other ports being open are a problem But they were not open automatically and I'm gonna get to the exact email that Plex sent me Plex saw your video and noticed at the three minute mark you state that Plex uses UPNP to Automatically open up UDP access on irrelevant ports and this is not the case the original net scout report made some material errors That were misleading to network operators and grossly overstated the threat Unfortunately, they did not reach out to Plex before issuing their misleading report So we do not have the opportunity to avoid the confusion in their report It was correct to state that if a Plex media server is accessible over the public Internet and port three two four one four is accessible. Yes, it can be Attacked and used in this DDoS attack they go on to say that well as I just stated only 32 400 TCP is what UPNP opens and it's Misconfigured firewalls or people have no firewall at all and just Plex on a public IP address that causes this issue I'll leave the full text here if you want to read it word for word down at a link below along with the forum post That is relevant to this in short if you update your Plex server, you're fine Also, if you don't misconfigure your firewall and you don't put your Plex on a public IP address with no firewall at all you're fine these are Perfectly fine to have Plex media server with UPNP because as of right now February 17th, 2021. There are no known attacks against TCP 32 400 the port needed for remote access to Plex I see that right now because there could be some problem in the future I never like to rule that out where someone's watching this two years from now I'm like I remember when he said that and next thing you know They found a vulnerability anytime you publicly expose anything There's always a potential for issues or abuse if a flaw is found in a thing that you publicly exposed So as always keep your servers up to date keep an eye on the security bulletins Really stop and think if you need to have something opened up. That's just good hygiene for security Just keep it all closed and only open up the things that are relevant and in the case of these 27,000 servers lots of people have lots of things open and well someone found all those open things and Exploited this so I'll leave a link to the other video I'll leave a link to the text down below in the first top comment here and the forum post related and That is all I just want to get this correction out there Thanks and thank you for making it to the end of the video if you like this video Please give it a thumbs up if you'd like to see more content from the channel hit the subscribe button And hit the bell icon if you like YouTube to notify you when new videos come out If you'd like to hire us head over to Lawrence systems calm fill out our contact page And let us know what we can help you with and what projects you'd like us to work together on If you want to carry on the discussion head over to forums dot Lawrence systems calm where we can carry on the discussion about this video Other videos or other tech topics in general even suggestions for new videos They're accepted right there on our forums, which are free Also, if you like to help the channel in other ways head over to our affiliate page We have a lot of great tech offers for you and once again, thanks for watching and see you next time