HoT-TAI-0005: Insecure 3rd party components / Vulnerable services


Summary:

  • This vulnerability type includes vulnerabilities in 3rd party components, such as BusyBox and similar utilities. BusyBox combines tiny versions of many common UNIX utilities into a single small executable, making it the "Swiss Army Knife of Embedded Linux" and a target for attackers. Other issues with 3rd party components include the use of outdated software and libraries (think SSL and Heartbleed or bash and Shellshock). Utilities such as BusyBox can contain vulnerable network services (e.g. web, ssh, telnet, ftp, tftp etc.). When considering vulnerable services, ensure that you are looking at TCP, UDP, and SCTP network facing services. Vulnerabilities covered herein may also be covered by other vulnerability types.
  • This vulnerability type also includes hidden / test / development services that the developer forgot to remove.

Estimated Overall Risk Assessment: MED


  • Technical Impacts: HIGH

  • Business Impacts: HIGH

  • Detectability: EASY(If known); HARD (If unknown)

  • Prevalence: COMMON

  • Exploitability: COMPONENT and VULNERABILITY DEPENDENT

Attack Surfaces Grouped By Layer of Cyberspace


  • Physical Network Layer
    • Device Firmware
    • Device Network Services

Known Intrusion / Exploit / Attack Cases and Threats


  • Bashlite
    • Description: Utilizes the ShellShock vulnerability found in the Bash command shell. Subsequent bot is utilized a part of a botnet for DDoS. Bashlite was the precursor to Mirai. Target: DVRs and IP cameras (95%) and home routers (4%).1

Identify, Detect, Protect, Respond, and Recover (NIST FICIC)


TBD

Analysis Tools and Training


TBD

Associated CVEs / Manufacturers / Devices


Application CVE ID VULN TYPE & SCORE DESCRIPTION
BusyBox CVE-2011-2716 Exec Code: 6.8 The DHCP client (udhcpc) in BusyBox before 1.20.0 allows remote DHCP servers to execute arbitrary commands via shell metacharacters in the (1) HOST_NAME, (2) DOMAIN_NAME, (3) NIS_DOMAIN, and (4) TFTP_SERVER_NAME host name options.The DHCP client (udhcpc) in BusyBox before 1.20.0 allows remote DHCP servers to execute arbitrary commands via shell metacharacters in the (1) HOST_NAME, (2) DOMAIN_NAME, (3) NIS_DOMAIN, and (4) TFTP_SERVER_NAME host name options.
BusyBox CVE-2016-6301 Remote DoS: 7.8 The recv_and_process_client_pkt function in networking/ntpd.c in busybox allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged NTP packet, which triggers a communication loop.
BusyBox CVE-2016-2147 Remote DoS Overflow: 5.0 Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.
BusyBox CVE-2016-2148 Remote Overflow: 7.5 Heap-based buffer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to have unspecified impact via vectors involving OPTION_6RD parsing.
BusyBox CVE-2016-2147 Remote DoS Overflow: 5.0 Integer overflow in the DHCP client (udhcpc) in BusyBox before 1.25.0 allows remote attackers to cause a denial of service (crash) via a malformed RFC1035-encoded domain name, which triggers an out-of-bounds heap write.
BusyBox CVE-2014-9645 Local Bypass: 2.1 The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
coreutils CVE-2016-2781 Not Available chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
coreutils CVE-2014-9471 DoS Exec Code: 7.5 The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the "--date=TZ="123"345" @1" string to the touch or date command.
GoAhead web server CVE-2017-5674 A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP ("GET system.ini HTTP/1.1\n\n" - note the lack of "/" in the path field of the request) request that will disclose the configuration file with the login password.
GoAhead web server CVE-2017-5675 Command Injection (Web) A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be executed with root privileges.A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be executed with root privileges.
Fisher-Price Smart Toy Bear API CVE-2015-8269 The API on Fisher-Price Smart Toy Bear devices allows remote attackers to obtain sensitive information or modify data by leveraging presence in an 802.11 network's coverage area and entering an account number.The API on Fisher-Price Smart Toy Bear devices allows remote attackers to obtain sensitive information or modify data by leveraging presence in an 802.11 network's coverage area and entering an account number.
CVE-2015-2884
CVE-2015-2884
CVE-2015-2886
CVE-2015-2887
CVE-2015-2888
CVE-2015-2889
CVE-2015-3036
CVE-2017-7911
CVE-2015-2247
CVE-2015-4080
CVE-2017-7243
CVE-2017-7240

References


  1. https://www.cyber.nj.gov/threat-profiles/botnet-variants/bashlite

results matching ""

    No results matching ""