Security Vulnerability of the Week 08/08/22

Vulnerability Weekly TLC Cisco Vmware DayTek TCL Slack Twitter

Previous Issues of vulnerability Weekly



This week we deep dive into Golang RCE, Cisco Router VPN bypass, VMWARE authentication bypass, TCL critical config bypass, DrayTek networking appliances vulnerability and breaches/hacks from NHS111 Slack and Twitter.


Appsec

Golang Vulnerability ParseThru

A Use Case for Go Generics - SecretHub

Researchers at Oxeye an Israel research organization, have discovered a new golang vulnerability.

“The newly discovered vulnerability allows a threat actor to bypass validations under certain conditions, as a result of unsafe URL parsing methods built in the language.”

Report from the firm: https://www.oxeye.io/blog/golang-parameter-smuggling-attack 

The issue, at its core, has to do with inconsistencies stemming from changes introduced to Golang’s URL parsing logic implemented in the “net/url” library.

While versions of the programming language before 1.17 treated semicolons as a valid query delimiter (e.g., example.com?a=1;b=2&c=3), this behaviour has since been modified to throw an error upon finding a query string containing a semicolon.

Credit Oxeye

“The net/url and net/http packages used to accept “;” (semicolon) as a setting separator in URL queries, in addition to “&” (ampersand),” according to the release notes for version 1.17 released last August.

“Now, settings with non-percent-encoded semicolons are rejected, and net/http servers will log a warning to ‘Server.ErrorLog’ when encountering one in a request URL.”

The issue is triggered when a Golang-based public API built upon version 1.17 or later communicates with a backend service running an earlier version, 

Similar to the log4j issue, if a string is crafted, it could be ignored by the frontend API but processed by the internal service causing remote code execution.

Oxeye has identified several versions of ParseThru in open-source projects such as Harbor, Traefik, and Skipper, which made it possible to bypass validations. 

From version 1.17 the issue has been fixed

The runtime/cgo package now provides a new facility that allows turning any Go values into a safe representation that can be used to pass values between C and Go safely. See runtime/cgo.Handle for more information.

URL query parsing

The net/url and net/http packages are used to accept “;” (semicolon) as a setting separator in URL queries, in addition to “&” (ampersand). Now, settings with non-percent-encoded semicolons are rejected, and net/http servers will log a warning to Server.ErrorLog when encountering one in a request URL.

Slack notified on august 5th 0.5% of its users that it reset their passwords after fixing a bug that did expose salted password hashes when creating or revoking shared invitation links for workspaces.

“When a user performed either of these actions, Slack transmitted a hashed version of their password (not plaintext) to other workspace members,”

Slack also added that it has no reason to consider that the bug was used to gain access to plaintext passwords before getting fixed.

Full report on: https://www.bleepingcomputer.com/news/security/slack-resets-passwords-after-exposing-hashes-in-invitation-links/ 


INFRA/Network

RCE vulnerability on 29 models of DrayTek 

Draytek router

Researchers at Trellix discovered a critical unauthenticated remote code execution (RCE) 

The vulnerability impacts 29 models of the DrayTek Vigor series of business routers.

Hackers who exploit this vulnerability could potentially perform the following actions (confirmed by bleepingcomputer):

  • complete device takeover,
  • information access,
  • laying the ground for stealthy man-in-the-middle attacks,
  • changing DNS settings,
  • using the routers as DDoS or crypto miner bots,
  • or pivoting to devices connected to the breached network.

Description of the attack:

A Shodan search returned over 700,000 online devices, most located in the UK, Vietnam, Netherlands, and Australia.

Trellix investigated the popular flagship product DrayTek’s and found that the web management interface suffers from a buffer overflow issue on the login page.

TLC Linkhub Mesh – 8 vulnerabilities identified in TCL LinkHub hub mesh WiFi 

TCL LINKHUB 5G Home Station Price - TCL 5G Routers

A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability. This vulnerability represents all occurrences of the buffer overflow vulnerability within the rp-pppoe.so binary.

Other functions like ucloud_del_node, confctl_set_wan_cfg confctl_set_master_wlan are also vulnerable to the bypass of access control

CVE-2022-24029, CVE-2022-26346, CVE-2022-27178, CVE-2022-27185, CVE-2022-25996, CVE-2022-26009, CVE-2022-26342, CVE-2022-27660

As all those vulnerabilities affect core part of the system and there is currently no patch available

For full article: 

https://malware.news/t/vulnerability-spotlight-how-misusing-properly-serialized-data-opened-tcl-linkhub-mesh-wi-fi-system-to-17-vulnerabilities/62285

 

Cisco Fixes bug that allows attacker Remote code execution on Small Business routers

Cisco Small Business VPN routers were affected by a remote code execution vulnerability fixed as per 3 August 2022. 

The unauthenticated remote attackers execute arbitrary code or commands and trigger denial of service (DoS) conditions on vulnerable devices.

Successful exploitation of CVE-2022-20842 with crafted HTTP input could allow attackers “to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a DoS condition,” the company explains.

CVE-2022-20827 exploits by submitting crafted input to the web filter database update feature can let threat actors “execute commands on the underlying operating system with root privileges.”

No in-the-wild exploitation

These security vulnerabilities were found by security researchers with the IoT Inspector Research Lab, the Chaitin Security Research Lab, and the CLP-team.

The company’s Product Security Incident Response Team (PSIRT) said Cisco is unaware of active exploitation or publicly available exploits in the wild.

Today, Cisco has also patched a third, high severity bug (CVE-2022-20841) in the Open Plug and Play (PnP) module of RV160, RV260, RV340, and RV345 series routers.

VMWARE Fixes Security Flaws on V Center 8 months after disclose

Another vulnerability affects VMWare administration devices. 

VMware warned admins on 2nd of August to apply a critical patch 

The patch fixes an authentication bypass security flaw affecting local domain users in multiple products and enabling unauthenticated attackers to gain admin privileges.

The flaw (CVE-2022-31656) was reported by Petrus Viet of VNG Security, who found that it impacts VMware Workspace ONE Access, Identity Manager, and vRealize Automation.

VMware had several vulnerabilities of recently now all fixed, all remote code execution enabling attackers to gain remote access (CVE-2022-31658, CVE-2022-31659, CVE-2022-31665) and escalate privileges to ‘root’ (CVE-2022-31660, CVE-2022-31661, CVE-2022-31664) on unpatched servers.

There is no evidence of exploitation in the wild as of today

VMware provides patch download links and detailed installation instructions on its knowledgebase website.

“It is extremely important that you quickly take steps to patch or mitigate these issues in on-premises deployments,” said Bob Plankers, Cloud Infrastructure Security & Compliance Architect at VMware.

“If your organization uses ITIL methodologies for change management, this would be considered an ’emergency’ change.”

The complete list of VMware products impacted by these vulnerabilities includes:

  • VMware Workspace ONE Access (Access)
  • VMware Workspace ONE Access Connector (Access Connector)
  • VMware Identity Manager (vIDM)
  • VMware Identity Manager Connector (vIDM Connector)
  • VMware vRealize Automation (vRA)
  • VMware Cloud Foundation
  • vRealize Suite Lifecycle Manager

Hacks/Data Breach

NHS 111 Suffered an outage from cyber attacks

NHS 111 - BLMK CCG

National Health Service (NHS) 111 emergency services were affected on the 5th of august by a significant and ongoing outage triggered by a cyberattack that hit the British managed service provider (MSP) Advanced systems.

A cyberattack hit advanced’s Adastra client patient management solution. 85% of NHS 111 leverages the system. 

The UK public is advised to access the NHS 111 emergency services online until the incident is resolved.

No data was exfiltrated, but the investigation is still ongoing.

The MSP’s list of customers includes the NHS, the UK Department for Work and Pensions (DWP), and the London City Airport.

NHS 111 outage

“A security issue was identified yesterday, which resulted in the loss of service,” Short said in a statement shared with the BBC.

“We can confirm that the incident is related to a cyber-attack, and as a precaution, we immediately isolated all our health and care environments.

“Early intervention from our Incident Response Team contained this issue to a small number of servers representing 2% of our Health & Care infrastructure.”

Twitter confirms zero-day

Twitter has confirmed a rescinded data breach leveraging a new zero-day (now fixed) 

Last month, BleepingComputer reported, did speak to a threat actor who said that they were able to create a list of 5.4 million Twitter account profiles using a vulnerability on the social media site.

This vulnerability allowed anyone to submit an email address or phone number, verify if it was associated with a Twitter account, and retrieve the associated account ID. The threat actor then used this ID to scrape the public information for the account.

https://www.bleepingcomputer.com/news/security/twitter-confirms-zero-day-used-to-expose-data-of-54-million-accounts/

Twitter data being sold on a hacker forumTwitter data being sold on a hacker forum

Source: BleepingComputer

Twitter has confirmed that the vulnerability used by the threat actor in December is the same one reported to and fixed by them in January 2022 as part of their HackerOne bug bounty program., 

Previous Issues of vulnerability Weekly


Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Phoenix Security now integrates with Google Cloud (GCP) Security Center, enabling comprehensive vulnerability management and ASPM across GCP, AWS, and Azure. Prioritize and manage vulnerabilities with enhanced Lacework integration for container security and cloud misconfigurations.- Associate assets with multiple Applications and Environments – Mapping of vulnerabilities to Installed Software – Find Assets/Vulns by Scanner – Detailed findings Location information Risk-based Posture Management – Risk and Risk Magnitude for Assets – Filter assets and vulnerabilities by source scanner Integrations – BurpSuite XML Import – Assessment Import API Other Improvements – Improved multi-selection in filters – New CVSS Score column in Vulnerabilities
Alfonso Eusebio
Phoenix Security proudly announces the launch of advanced features designed to enhance Application Security Posture Management (ASPM), streamline vulnerability management, and improve vulnerability remediation campaigns. Our latest capabilities empower security teams to monitor and remediate vulnerabilities at scale, utilizing an advanced AI system that rapidly categorizes vulnerabilities and suggests optimal campaigns for scheduling. This new AI-driven approach aligns with our One Backlog feature and Security Champion initiative, both focused on remediating systemic vulnerabilities and reducing team burnout. Recognized as a Gartner Top ASPM provider in the Voice of the Customer 2024, Phoenix Security has collaborated with leading clients to develop innovative solutions that address the complexities of vulnerability remediation. Our campaigns facilitate real-time monitoring, improve collaboration across teams, and ensure that organizations can effectively respond to evolving security threats, including high-impact vulnerabilities like Log4j. Explore how Phoenix Security can transform your vulnerability management practices and enhance your organization’s overall security posture. – Mapping of vulnerabilities to Installed Software – Find Assets/Vulns by Scanner – Detailed findings Location information Risk-based Posture Management – Risk and Risk Magnitude for Assets – Filter assets and vulnerabilities by source scanner Integrations – BurpSuite XML Import – Assessment Import API Other Improvements – Improved multi-selection in filters – New CVSS Score column in Vulnerabilities
Francesco Cipollone
What the heck is ASPM and how modern ASPM address new challenges? In this article we explore Application Security Posture Management (ASPM) and how it has become essential for organizations looking to safeguard their applications throughout the software development lifecycle (SDLC). But what truly defines a modern ASPM solution? In this article, we delve into the typical ASPM vendors, explore edge cases, and outline the fundamental pillars that unite them. At Phoenix Security, we recognize the challenges posed by diverse organizational structures, making ASPM as much about data and culture as it is about vulnerability management. That’s why we’ve introduced our ONE BACKLOG feature, which merges security champion initiatives with vulnerability workflows into a single, actionable dashboard. This integration empowers security teams to maintain a comprehensive view of vulnerabilities across code, cloud, and other artifacts, streamlining prioritization and remediation efforts. ASPM is more than just a framework; it’s a proactive strategy that fosters collaboration between development, security, and operations teams. With benefits like unified visibility, risk-based prioritization, and continuous monitoring, organizations can effectively identify and address vulnerabilities, ensuring a robust security posture. Join us as we explore the future of ASPM, focusing on code-to-cloud native solutions, maximizing existing tools, and nurturing a culture of security that transcends traditional barriers. Learn how ASPM can revolutionize your approach to application security and enhance your organization’s resilience in an ever-evolving threat landscape.
Francesco Cipollone
Enhance your vulnerability management with Application Security Posture Management (ASPM) and reachability analysis. Discover how ASPM helps prioritize exploitable vulnerabilities, reduce security noise, and improve risk management. Learn about advanced techniques like code and container reachability, contextual deduplication, and Phoenix Security’s cutting-edge solutions for smarter, more effective application security.
Francesco Cipollone
Phoenix Security’s Application Security Posture Management (ASPM) introduces Reachability Analysis and Contextual Deduplication to revolutionize vulnerability management. These features help security teams prioritize risks by correlating vulnerabilities from code to runtime, focusing on what’s exploitable. With contextual deduplication, Phoenix reduces vulnerability noise by up to 95%, ensuring only real threats are addressed. Stay ahead with 4D Risk Quantification, combining business criticality, network, and runtime reachability for smarter, more effective security.- Associate assets with multiple Applications and Environments – Mapping of vulnerabilities to Installed Software – Find Assets/Vulns by Scanner – Detailed findings Location information Risk-based Posture Management – Risk and Risk Magnitude for Assets – Filter assets and vulnerabilities by source scanner Integrations – BurpSuite XML Import – Assessment Import API Other Improvements – Improved multi-selection in filters – New CVSS Score column in Vulnerabilities
Francesco Cipollone
Phoenix Security now integrates with Google Cloud (GCP) Security Center, enabling comprehensive vulnerability management and ASPM across GCP, AWS, and Azure. Prioritize and manage vulnerabilities with enhanced Lacework integration for container security and cloud misconfigurations.- Associate assets with multiple Applications and Environments – Mapping of vulnerabilities to Installed Software – Find Assets/Vulns by Scanner – Detailed findings Location information Risk-based Posture Management – Risk and Risk Magnitude for Assets – Filter assets and vulnerabilities by source scanner Integrations – BurpSuite XML Import – Assessment Import API Other Improvements – Improved multi-selection in filters – New CVSS Score column in Vulnerabilities
Alfonso Eusebio
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO