Critical Root RCE Bug Affects Multiple Netgear SOHO Router Models

Networking equipment company Netgear has released yet another round of patches to remediate a high-severity remote code execution vulnerability affecting multiple routers that could be exploited by remote attackers to take control of an affected system.

Tracked as CVE-2021-34991 (CVSS score: 8.8), the pre-authentication buffer overflow flaw in small office and home office (SOHO) routers can lead to code execution with the highest privileges by taking advantage of an issue residing in the Universal Plug and Play (UPnP) feature that allows devices to discover each other’s presence on the same local network and open ports needed to connect to the public Internet.

Automatic GitHub Backups

Because of its ubiquitous nature, UPnP is used by a wide variety of devices, including personal computers, networking equipment, video game consoles and internet of things (IoT) devices.

Specifically, the vulnerability stems from the fact that the UPnP daemon accepts unauthenticated HTTP SUBSCRIBE and UNSUBSCRIBE requests — which are event notification alerts that devices use to receive notifications from other devices when certain configuration changes, such as media sharing, happen.

But according to GRIMM security researcher Adam Nichols, there exists a memory stack overflow bug in the code that handles the UNSUBSCRIBE requests, which enables an adversary to send a specially crafted HTTP request and run malicious code on the affected device, including resetting the administrator password and delivering arbitrary payloads. Once the password has been reset, the attacker can then login to the webserver and modify any settings or launch further attacks on the webserver.

AVvXsEjaUtsGVFW9gAGtcxtyAzlHjkQ9DJCX6IlIOpBy6Gei fDhpk45h K0TuIQD76tE2V5clr8NlxnLQn 50WmqSlmAvA2Pa7IhnFnrJyddBV6Tw6VA N IteI BS24VqW4E MYLhUMa67Zfg0XG30QDVKCt RAIW idSZUNokQjD0tETc6pZvbXJH9I2M

“Since the UPnP daemon runs as root, the highest privileged user in Linux environments, the code executed on behalf of the attacker will be run as root as well,” Nichols said. “With root access on a device, an attacker can read and modify all traffic that is passed through the device.”

Prevent Data Breaches

This is far from the first time vulnerable implementations of UPnP have been uncovered in networked devices.

In June 2020, security researcher Yunus Çadirci discovered what’s called a CallStranger vulnerability (CVE-2020-12695, CVSS score: 7.5) wherein a remote, unauthenticated attacker may be able to abuse the UPnP SUBSCRIBE capability to send traffic to arbitrary destinations, resulting in amplified DDoS attacks and data exfiltration. What’s more, no fewer than 45,000 routers with vulnerable UPnP services were previously leveraged in a 2018 campaign to deploy EternalBlue and EternalRed exploits on compromised systems.

Source link

[email protected] (Ravie Lakshmanan)

Get worry-free complete website cleanup and protection

Our software continuously scans for malware using our accurate anti-malware database; your site continues to run stable after cleanup. Malware removal takes a moment, not hours. Compatible with PHP-based websites and popular frameworks like WordPress, Drupal, Joomla, DLE, etc.

Our website antivirus does more than just find and remove infected files on your website or put them in quarantine, It removes malicious code (redirections, trojans, backdoors, shell scripts, and other malicious code) from files like PHP, JS, HTML, images, and system files in seconds with high accuracy.

Share your love