23 September 2021 at 12:47 UTC
Updated: 24 September 2021 at 09:07 UTC
Bug in third-party code offers salutary lessons around enterprise risk management, say researchers
UPDATED Multiple Netgear routers contained a third-party vulnerability that could lead to remote code execution (RCE) via Manipulator-in-the-Middle (MitM) attacks, security researchers have revealed.
Now patched, the vulnerability (CVE-2021-40847) was found in the update process for Circle, a third-party application that provides parental control features in the affected, small office/home office (SOHO) devices.
The Circle update daemon, , “connects to Circle and Netgear to obtain version information and updates” for its filtering database, infosec firm GRIMM explained in a blog post published on Tuesday (September 21).
RELATED VPN users unmasked by zero-day vulnerability in Virgin Media routers
However, database updates from Netgear were unsigned and downloaded via HTTP, which meant attackers could “respond to update requests with a specially-crafted, compressed database file, the extraction of which gives the attacker the ability to overwrite executable files with attacker-controlled code.”
Successful exploitation of the high-severity bug (CVSS 8.1) hinges on attackers being able to intercept and modify a vulnerable router’s network traffic.
But while the MitM “requirement does reduce the number of scenarios in which the vulnerability is exploitable, it doesn’t change the impact of successful exploitation,” GRIMM told The Daily Swig.
The researchers outlined a DNS-based MitM attack that raced DNS queries from the Circle update daemon. These races are reliably won with GRIMM’s proof-of-concept (PoC) exploit, making code execution “trivial to obtain”, said GRIMM.
Other forms of MitM attacks could potentially work too, added the firm.
The researchers said compromised routers could also form “part of a larger chain to infiltrate more secure environments”.
This could involve compromising the internet service provider (ISP) via phishing, before compromising vulnerable Netgear routers as well as computers connected to the devices via a flaw such as the PrintNightmare vulnerability, suggested GRIMM.
Attackers could then pivot to the corporate network to “exfiltrate corporate data or launch further attacks”.
‘Attack surface reduction’
GRIMM also said the “vulnerability once again demonstrates the importance of attack surface reduction” given that the Circle update daemon, unlike the parental controls, is enabled by default.
“While it doesn’t fix the underlying issue, simply disabling the vulnerable code when Circle is not in use would have prevented exploitation on most devices,” reads the blog post.
Read more of the latest hardware security news
Even though SOHO devices are designed for home offices or small businesses, the dramatic increase in home working due to the Covid-19 pandemic highlights a blind spot for enterprises, argued GRIMM.
“SOHO devices typically fly under the radar when it comes to cybersecurity risk management,” said the infosec firm, which recommends that enterprises use virtual private networks (VPNs) to mitigate SOHO risks.
GRIMM first attempted to notify the vendor of the flaw on July 23, making three attempts overall before notifying the US Cybersecurity and Infrastructure Security Agency (CISA) on August 9 and subsequently coordinating with Netgear.
The vendor released firmware upgrades on September 21. Affected models include R6400v2, R6700, R6700v3, R6900, R6900P, R7000, R7000P, R7850, R7900, R8000, and RS400.
Netgear has not responded to additional queries from The Daily Swig. We will update the story if and when it does.
This article was updated with a comment from GRIMM on September 24.
YOU MAY ALSO LIKE VMware security warning: Multiple vulnerabilities in vCenter Server could allow remote network access
Nebraska lawmakers advance one parental control bill, while others lie in wait |
Nebraska lawmakers advanced a bill Monday aimed at giving parents a bigger say in what schools can teach their children,...
How to configure the parental controls on your child’s mobile phone | Science & Tech
Adolescents on the internet face a broad vary of probable dangers, from cyberbullying to communicating with strangers to accessing inappropriate...
Snapchat provides new parental controls that block ‘sensitive’ and ‘suggestive’ content from viewing by teens
Snapchat released parental controls on its app final yr through the new “Family Center” element. Right now, the enterprise declared...
From school choice to parents’ rights, Kansas lawmakers are pushing education changes
WICHITA, Kansas — Dozens of education bills making their way through the Kansas Legislature this session could have a profound...
Restrict Launcher Set to Change Landscape of Parental Regulate Equipment
The device permits parents to control children’s on the net and gaming practices with out the fuss of constant routine...
MMGuardian parental command software package assessment
Among the the myriad of parental command applications offered right now, it can be tough for mom and dad to...