Millions Of Iot Devices And Routers Could Have A Mega Security Flaw

Millions of IoT devices and routers could accept a mega security flaw



(Image credit: Shutterstock)

An unpatched vulnerability in a popular C standard library found in a broad range of IoT
(opens in new tab)

products and routers
(opens in new tab)

could put millions of devices at risk of set on.

The vulnerability, tracked equally CVE-2022-05-02 and discovered past Nozomi Networks
(opens in new tab)
, is present in the domain name organization (DNS
(opens in new tab)
) component of the library uClibc and its uClibc-ng fork from the OpenWRT team. Both uClibc and uClibc-ng are widely used by Netgear, Axis, Linksys and other major vendors as well as in Linux distros
(opens in new tab)

designed for embedded applications.

uClibc’s DNS implementation provides a mechanism for performing DNS-related requests including lookups and translating domain names
(opens in new tab)

to IP addresses
(opens in new tab)
.

At this fourth dimension, a ready is currently unavailable from uClibc’south developer which ways that devices from more than 200 vendors are currently at adventure of DNS poisoning or DNS spoofing that can redirect a potential victim to a malicious website hosted on an attacker controlled server.

Risk of DNS poisoning

Security researchers at Nozomi offset came across the vulnerability in uClibc later on reviewing traces of DNS requests performed by a connected device at which time they establish several peculiarities caused by the library’s internal lookup part. Upon further investigation, the IoT security firm discovered that the transaction IDs of these DNS lookup requests were anticipated and therefore DNS poisoning could exist possible in certain circumstances.

Popular:   Hulu cancels star-studded Marvel show after just one season

Nozomi Networks provided further insight in a blog post
(opens in new tab)

on what an assaulter could accomplish past carrying out DNS poisoning on vulnerable IoT devices and routers, saying:

“A DNS poisoning set on enables subsequent Man-in-the-Middle attacks considering the aggressor, by poisoning DNS records, is capable of rerouting network communications to a server under their control. The assailant could and then steal and/or manipulate information transmitted by users, and perform other attacks against those devices to completely compromise them. The primary outcome here is how DNS poisoning attacks tin can strength an authenticated response.”

Afterward discovering this flaw in uClibc back in September of last yr, Nozomi immediately informed CISA
(opens in new tab)

near information technology so reported its findings to the CERT Coordination Middle in Dec. Withal, it wasn’t until Jan of this year that the business firm disclosed the vulnerability to the vendors whose devices may be impacted by the flaw.

While a fix currently isn’t available, the affected vendors and other stakeholders are working together to develop a patch. Notwithstanding though, once a patch is set up, end-users will need to apply it themselves on their devices through firmware updates but this could delay the amount of time it takes for the vulnerability to be stock-still for skilful.

  • Shield all of the devices on your network from attacks with the best endpoint protection software
    (opens in new tab)

Via BleepingComputer
(opens in new tab)

Millions Of Iot Devices And Routers Could Have A Mega Security Flaw

Source: https://www.techradar.com/news/millions-of-iot-devices-and-routers-could-have-a-mega-security-flaw#:~:text=Millions%20of%20IoT%20devices%20and%20routers%20could%20have%20a%20mega%20security%20flaw,-By%20Anthony%20Spadafora&text=An%20unpatched%20vulnerability%20in%20a,devices%20at%20risk%20of%20attack.