Name:Wreck DNS Bugs Put IoT Devices At Risk
#1
Exclamation 
Quote:
[Image: Heimdal-Security-News-and-Updates-1030x360-6.png]

The New DNS Vulnerabilities Could Impact Millions of IoT Devices Worldwide If Not Patched.

Security experts from Forescout and JSOF have discovered a new set of DNS vulnerabilities that could impact more than 100 million IoT devices used by consumers and organizations. They have labeled them Name:Wreck and published a report in this regard.

The Name:Wreck vulnerabilities affect four TCP/IP stacks – FreeBSD, IPnet, Nucleus NET, and NetX, which are present in well-known IT software and IoT/OT firmware, potentially impacting organizations in the government, enterprise, healthcare, manufacturing, and retail sectors.

FreeBSD, for instance, is used for high-performance servers in millions of IT networks, including major web destinations such as Netflix and Yahoo. Meanwhile, Nucleus NET IoT/OT has been used for decades in critical OT firmware such as Siemens, as well as in IoT devices.

In the U.S. alone, more than 180,000 devices are believed to be affected and over 36,000 devices were impacted by Name:Wreck in the UK. If exploited, bad actors can use them to take target devices offline or assume control of their operations.

According to Forescout Research Manager Daniel dos Santos,
 
Quote:NAME:WRECK is a significant and widespread set of vulnerabilities with the potential for large scale disruption. Complete protection against NAME:WRECK requires patching devices running the vulnerable versions of the IP stacks and so we encourage all organizations to make sure they have the most up to date patches for any devices running across these affected IP Stacks.

In the attack scenario, the attacker obtains Initial Access into an organization’s network by compromising a device issuing DNS requests to an Internet server.

To gain initial access, the attacker can exploit one of the RCEs affecting Nucleus NET. The compromise can happen, for example, by weaponizing the exploitation.

DNS-based vulnerabilities require the attacker to reply to a legitimate DNS request with a malicious packet. That can be achieved by exploiting the queried DNS servers. Servers or forwarders vulnerable to DNSpooq and similar vulnerabilities could be exploited to reply with malicious messages carrying a weaponized payload.

After the initial access, the hacker can use the compromised entry point to set up an internal DHCP server and do a Lateral Movement by executing malicious code on vulnerable internal servers.

Finally, the attacker can use those internal compromised servers to Persist on the target network or to Exfiltrate data through the Internet-exposed IoT device.

Worst-Case ScenarioAccording to Help New Security, some hypothetical but entirely plausible consequences of exploiting these vulnerabilities include:
  • Exposing government or organizations servers, by accessing sensitive data;
  • Compromising hospitals, by connecting to medical devices to obtain healthcare data, taking them offline, and preventing healthcare delivery;
  • Impacting manufacturing, by obtaining access to factory/plant networks to tamper with production lines;
  • Shutting down retailers, by switching off lights connected to their building automation controllers.
What’s more, threat actors could also tap into the critical building functions of residential and commercial spaces, including major hotel chains, to endanger the safety of residents. This could include:
  • Tampering with heating, ventilation, and air conditioning systems;
  • Disabling critical security systems, such as alarms and door locks;
  • Shutting down automated lighting systems.
 
Quote:Unless urgent action is taken to adequately protect networks and the devices connected to them, it could be just a matter of time until these vulnerabilities are exploited, potentially resulting in major government data hacks, manufacturer disruption or [compromise of] hotel guest safety and security.

Patches are now available for FreeBSD, Nucleus NET, and NetX.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Geekbench flags Intel Binary Optimizati...
Geekbench says Intel...harlan4096 — 16:40
Surfshark VPN : Award-winning VPN servi...
VPN encryption exp...jasonX — 12:36
Surfshark VPN : Award-winning VPN servi...
5-9-14 Eyes and VP...jasonX — 12:04
QOwnNotes
26.3.24  Added bloc...Kool — 10:38
K-Lite Codec Pack 19.6.0 / 19.6.4 Update
Changes in 19.6.4 ...harlan4096 — 09:03

[-]
Birthdays
Today's Birthdays
avatar (44)lamSouse
Upcoming Birthdays
avatar (45)wapedDow
avatar (49)oapedDow
avatar (42)Sanchowogy
avatar (46)MeighGoask
avatar (47)creatralGuelm
avatar (38)procnipsut
avatar (44)accenwibly
avatar (41)ahyvily
avatar (38)urumahiz
avatar (44)techlignub
avatar (43)Stevenmam
avatar (50)onlinbah
avatar (50)fuspeukChark
avatar (44)werriewWaiNg
avatar (38)Freemanleo
avatar (48)cticigges
avatar (50)ecoFit
avatar (44)soccejeS
avatar (43)cdoubapKit
avatar (38)lystraPonia
avatar (31)smith8395john
avatar (51)steakelask
avatar (45)Termoplenka
avatar (43)bycoPaist
avatar (49)pieloKat
avatar (43)ilyagNeexy
avatar (51)donitascene
avatar (51)burntLaw
avatar (41)MrDoorsskibheeds
avatar (51)Toligo
avatar (46)Rodneykak
avatar (49)tradeSmode
avatar (39)vemedProkbior
avatar (38)RobertUtelt
avatar (46)JamesZic
avatar (43)Sanfordbup
avatar (38)Der.Reisende
avatar (41)alapesihy
avatar (36)Kiran78

[-]
Online Staff
There are no staff members currently online.

>