Go Back   IceInSpace > Equipment > Software and Computers
Register FAQ Calendar Today's Posts Search

Reply
 
Thread Tools Rate Thread
  #1  
Old 22-06-2020, 02:23 PM
gary
Registered User

gary is offline
 
Join Date: Apr 2005
Location: Mt. Kuring-Gai
Posts: 5,928
Exclamation Ripple20: Zero Day exploits found affecting millions of internet connected devices

17th June 2020

JSOF, a cyber security consultancy in Israel, has announced the discovery
of a series of serious zero-day exploits impacting potentially
hundreds of millions of IoT (Internet of Things) devices.

Quote:
Originally Posted by JSOF
The JSOF research lab has discovered a series of zero-day vulnerabilities in a widely used low-level TCP/IP software library developed by Treck, Inc. The 19 vulnerabilities, given the name Ripple20, affect hundreds of millions of devices (or more) and include multiple remote code execution vulnerabilities. The risks inherent in this situation are high. Just a few examples: data could be stolen off of a printer, an infusion pump behavior changed, or industrial control devices could be made to malfunction. An attacker could hide malicious code within embedded devices for years. One of the vulnerabilities could enable entry from outside into the network boundaries; and this is only a small taste of the potential risks.

The interesting thing about Ripple20 is the incredible extent of its impact, magnified by the supply chain factor. The wide-spread dissemination of the software library (and its internal vulnerabilities) was a natural consequence of the supply chain “ripple-effect”. A single vulnerable component, though it may be relatively small in and of itself, can ripple outward to impact a wide range of industries, applications, companies, and people.
For example, the Treck TCP/IP stack is used in certain HP and Samsung
branded printers :-
https://support.hp.com/in-en/document/c06640149

and in some Cisco routers and gateways :-
https://tools.cisco.com/security/cen...stack-JyBQ5GyC

JSOF announcement here :-
https://www.jsof-tech.com/ripple20/

Advice is given under the section Risk Evaluation and Mitigations.
Certainly perform an assessment on any device that is Internet facing.

Treck vulnerability announcements :-
https://treck.com/vulnerability-response-information/
Reply With Quote
  #2  
Old 22-06-2020, 02:42 PM
multiweb's Avatar
multiweb (Marc)
ze frogginator

multiweb is offline
 
Join Date: Oct 2007
Location: Sydney
Posts: 22,062
Scary stuff. Thanks for the heads up.
Reply With Quote
  #3  
Old 22-06-2020, 03:01 PM
Nikolas's Avatar
Nikolas (Nik)
Dazed and confused

Nikolas is offline
 
Join Date: May 2012
Location: Melbourne
Posts: 3,267
What does that mean in laymans terms all I read was It gibberish
Reply With Quote
  #4  
Old 22-06-2020, 03:25 PM
leon's Avatar
leon
Registered User

leon is offline
 
Join Date: Apr 2006
Location: Warrnambool
Posts: 12,449
Yea, I,m with you Nik.

Leon
Reply With Quote
  #5  
Old 22-06-2020, 03:45 PM
gary
Registered User

gary is offline
 
Join Date: Apr 2005
Location: Mt. Kuring-Gai
Posts: 5,928
Quote:
Originally Posted by Nikolas View Post
What does that mean in laymans terms all I read was It gibberish
Hi Nik,

An increasing number of appliances come with Ethernet or WiFi connectivity.

A good example is a network connected printer.

Normally these devices are only exposed to your local intranet.

However, some devices can be configured to be remotely accessible
through the Internet as well.

For example, APC is a well-known manufacturer of Uninterruptible
Power Supplies (UPS's). Some higher-end models have networking
capability and can be configured to be accessed remotely.
Perhaps one is in a remote observatory that the owner can receive alerts
from if the mains power fails.

One vulnerability exists in some of these UPS's. An attacker can gain access
to the internal network via the UPS.

The software module within these devices that provides networking
capability is referred to as a TCP/IP stack. There are many sources of
TCP/IP stacks. However some equipment manufacturers purchased
TCP/IP stacks from a company called Treck Inc. to embed within their
own products. The stacks from Treck Inc. are the ones found to have
multiple vulnerabilities.

As a rule of thumb, if you have a device that can be configured to be
accessible remotely over the internet, treat it with suspicion if you have
configured it to do so. Ask yourself, do you really need to access it remotely?

Though it is not directly related to the Treck TCP/IP stack exploit, in
particular it is prudent to treat IP security cameras with suspicion.
Many households and organizations equip themselves with security
cameras that they can then monitor remotely. Apart from the potential
of being "hijacked" by an outsider, if the software that was embedded in
them in the first place contains a backdoor or trojan horse, it can result
in not only the camera's images being accessed by a third party, but
make all other devices including computers on the same network
vulnerable.

Also treat Internet of Things (IoT) devices with their own embedded WiFi hubs
with suspicion. For example, a quick scan of access points on my smartphone
reveals neighbours running multiple IoT devices. I have no idea what they are
specifically, but for example might be IP cameras or some form of home automation.
Though the "lock" icon shows they are secure using WPA-2 or some other WiFi security
mechanism, they are a good example of the type of device that may have a vulnerability.
WiFi devices that provide WPS as the security mechanism these days are regarded as vulnerable.
Don't run WPS.
Reply With Quote
  #6  
Old 22-06-2020, 04:39 PM
Nikolas's Avatar
Nikolas (Nik)
Dazed and confused

Nikolas is offline
 
Join Date: May 2012
Location: Melbourne
Posts: 3,267
Quote:
Originally Posted by gary View Post
Hi Nik,

An increasing number of appliances come with Ethernet or WiFi connectivity.

A good example is a network connected printer.

Normally these devices are only exposed to your local intranet.

However, some devices can be configured to be remotely accessible
through the Internet as well.

For example, APC is a well-known manufacturer of Uninterruptible
Power Supplies (UPS's). Some higher-end models have networking
capability and can be configured to be accessed remotely.
Perhaps one is in a remote observatory that the owner can receive alerts
from if the mains power fails.

One vulnerability exists in some of these UPS's. An attacker can gain access
to the internal network via the UPS.

The software module within these devices that provides networking
capability is referred to as a TCP/IP stack. There are many sources of
TCP/IP stacks. However some equipment manufacturers purchased
TCP/IP stacks from a company called Treck Inc. to embed within their
own products. The stacks from Treck Inc. are the ones found to have
multiple vulnerabilities.

As a rule of thumb, if you have a device that can be configured to be
accessible remotely over the internet, treat it with suspicion if you have
configured it to do so. Ask yourself, do you really need to access it remotely?

Though it is not directly related to the Treck TCP/IP stack exploit, in
particular it is prudent to treat IP security cameras with suspicion.
Many households and organizations equip themselves with security
cameras that they can then monitor remotely. Apart from the potential
of being "hijacked" by an outsider, if the software that was embedded in
them in the first place contains a backdoor or trojan horse, it can result
in not only the camera's images being accessed by a third party, but
make all other devices including computers on the same network
vulnerable.

Also treat Internet of Things (IoT) devices with their own embedded WiFi hubs
with suspicion. For example, a quick scan of access points on my smartphone
reveals neighbours running multiple IoT devices. I have no idea what they are
specifically, but for example might be IP cameras or some form of home automation.
Though the "lock" icon shows they are secure using WPA-2 or some other WiFi security
mechanism, they are a good example of the type of device that may have a vulnerability.
WiFi devices that provide WPS as the security mechanism these days are regarded as vulnerable.
Don't run WPS.



Awesome explanation, I'm all good then Cheers
Reply With Quote
  #7  
Old 22-06-2020, 08:01 PM
peter_4059's Avatar
peter_4059 (Peter)
Big Scopes are Cool

peter_4059 is offline
 
Join Date: Jun 2007
Location: SE Tasmania
Posts: 4,532
Gary,

Does the vulnerability end when the device is no longer connected to the network or does it remain with any software installed to connect to the device?

Cheers,

Peter
Reply With Quote
  #8  
Old 22-06-2020, 08:37 PM
LewisM's Avatar
LewisM
Novichok test rabbit

LewisM is offline
 
Join Date: Aug 2012
Location: Somewhere in the cosmos...
Posts: 10,388
Cisco is well known to have specific and DELIBERATE back-end vulnerability built in as per specific governmental demand (you can guess who), and yet governments, including ours, continue to use Cisco (because we are TOLD to). Samsung vulnerability for back end remote hijack is also well known, especially their "Smart" devices.

US governemnt would have you think Huawei is a worry for spying...only when it directly competes with the US' own spying "rights" of course. Look what our government recently signed into law regarding phone tapping, hacking, remote access etc with nary a squeak of it being made public, with SFA public consultation. 5 Eyes at its most back-handed.
Reply With Quote
  #9  
Old 22-06-2020, 09:01 PM
multiweb's Avatar
multiweb (Marc)
ze frogginator

multiweb is offline
 
Join Date: Oct 2007
Location: Sydney
Posts: 22,062
My russian made kettle wants to take over the world.
Reply With Quote
  #10  
Old 22-06-2020, 11:57 PM
gary
Registered User

gary is offline
 
Join Date: Apr 2005
Location: Mt. Kuring-Gai
Posts: 5,928
Quote:
Originally Posted by peter_4059 View Post
Gary,

Does the vulnerability end when the device is no longer connected to the network or does it remain with any software installed to connect to the device?

Cheers,

Peter
Hi Peter,

In one worse case scenario, if someone had already exploited the
vulnerability of an internet facing device to get into the intranet and
then created additional back doors for themselves on other devices
such as routers or computers, then it would be a case of closing the
barn door after the horse has already bolted.

But one would have to be unlucky.

Firstly, you would need to have a device that has the Treck TCP/IP stack
installed and for it to be internet accessible. Secondly, you would have to
then be targeted before having either patched the vulnerable device or
re-configured it to no longer being internet accessible.

As JSOF noted, the supply chain for this particular stack may be complex.
One manufacturer who originally purchased the stack may in turn have
other OEM customers.
Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT +10. The time is now 07:12 AM.

Powered by vBulletin Version 3.8.7 | Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Advertisement
Bintel
Advertisement
Testar
Advertisement