RCE vulnerability Archives – Gridinsoft Blog https://gridinsoft.com/blogs/tag/rce-vulnerability/ Welcome to the Gridinsoft Blog, where we share posts about security solutions to keep you, your family and business safe. Thu, 28 Mar 2024 18:23:07 +0000 en-US hourly 1 https://wordpress.org/?v=61975 200474804 ShadowRay Vulnerability Threatens AI Workloads, No Patch Available https://gridinsoft.com/blogs/shadowray-vulnerability-uncovered/ https://gridinsoft.com/blogs/shadowray-vulnerability-uncovered/#respond Thu, 28 Mar 2024 18:19:00 +0000 https://gridinsoft.com/blogs/?p=20837 Recent review of vulnerabilities in the Ray framework uncovered the unpatched flaw, dubbed ShadowRay. It appears that hundreds of machine learning clusters were already compromised, leading to the leak of ML assets. Researchers trace the first attack that used this vulnerability to September 2023, meaning that the vulnerability already circulates for over half a year.… Continue reading ShadowRay Vulnerability Threatens AI Workloads, No Patch Available

The post ShadowRay Vulnerability Threatens AI Workloads, No Patch Available appeared first on Gridinsoft Blog.

]]>
Recent review of vulnerabilities in the Ray framework uncovered the unpatched flaw, dubbed ShadowRay. It appears that hundreds of machine learning clusters were already compromised, leading to the leak of ML assets. Researchers trace the first attack that used this vulnerability to September 2023, meaning that the vulnerability already circulates for over half a year.

Shadow Ray Vulnerability Allows for RCE

Ray, one of the most popular open source AI frameworks, contains a severe vulnerability, with hundreds of exploitation cases known at the moment. The research of Oligo Security uncovers the peculiar story of CVE-2023-48022: it was originally detected together with four others back in December 2023. While Anyscale, the developer, managed to fix the rest pretty quickly, one became a subject of discussions. The devs stated it is an intended behavior and not a bug, refusing to fix the issue.

ShadowRay vulnerability exploitation scheme

CVE-2023-48022, coined ShadowRay, is a remote code execution flaw that stems from lack of authorization in Jobs API. The latter in fact allows anyone to create jobs for the cluster after accessing the dashboard. Among the possible jobs is code execution – a function the users need quite often in the typical workflow. This in fact was the point of controversy when another research team discovered the flaw in 2023. Anyscale insists that security around the framework and all its assets should be established by the users.

Remote code execution vulnerabilities are one of the most severe out there, as they in fact allow for simultaneous code execution on several machines. In this specific case, it is not workstations that are in danger, but ML clusters, with all the computing power and data they have.

How Critical is This Flaw?

As I said, the Ray framework is among the most popular ones for handling AI workloads. Among its users are loud names like Amazon, Netflix, Uber, Spotify, LinkedIn and OpenAI, though there are hundreds and thousands of smaller companies. Their GitHub repository boasts of over 30k stars, meaning that the total user count definitely exceeds this number. So yes, the attack surface is pretty significant.

Much worse things surface when we think about what exactly is compromised. When compared to workstations, corporate networks and servers, machine learning clusters are completely different. They are powerhouse systems, with ML workloads oriented hardware and related data, like access tokens, credentials to the connected apps, and so on. Numerous system that keep such info are interconnected using Ray framework. So a successful exploitation of ShadowRay effectively equals accessing the entirety of all this.

Ray dashboard compromised
Ray dashboard with all the cluster’s data. Source: Oligo

Despite being oriented towards AI workloads, hardware, more specifically GPUs, are still usable for other workloads. In particular, upon accessing the ML cluster, frauds can deploy coin miner malware that would fill their purses at the expense of the victim company. But what is more concerning here is the possibility of dataset leak. Quite a few companies learn their AIs using their own unique developments, or the selection of carefully picked data. Leaking corporate secrets may be critical for large companies, and fatal for smaller ones.

ShadowRay Vulnerability Exploited in the Wild

The most unfortunate part about the ShadowRay flaw is that it is already exploited in real-world attacks. Moreover, hackers most likely exploited it way before its discovery. The original research says the first exploitation cases happened back in September 2023. However, they did not stop, as there were also attacks that happened less than a month ago – in late February 2024.

Among the visible consequences of the attack were malicious coin miners that exploited the powerful hardware of hacked clusters. Hackers particularly deployed XMRig, NBMiner and Zephyr malicious miners. All of them were running off the land, meaning that static analysis was practically useless against this malware.

Less obvious, but potentially more critical was the leak of data kept on the clusters. I am talking not only about the datasets, but also workflow related information, like passwords, credentials, access tokens, and even cloud environments access. From this point of view, this is rather similar to compromising a server that handles the workflow of a software developing team.

ShadowRay Fixes Are Not Available

As I’ve mentioned above, Anyscale does not agree with the definition of absent input authentication in Jobs API as vulnerability. They believe that the user should take care about the security of the Ray framework. And I somewhat agree with this, with only one caveat: the need for a visible warning about such a “feature” during the setup. When it comes to the scale of OpenAI or Netflix, such shortcomings are inacceptable.

At the moment, the best mitigation is to filter the access to the dashboard. A properly configured firewall will fit well for this purpose. Experts also offer to set up the authentication to the Ray Dashboard port (8265), effectively fixing the vulnerability.

Use advanced security solutions that will be able to detect memory threats as well as malware on the disk. In almost all attack cases, adversaries did not leave any files on the disk, performing the attack in the LOTL form. EDR/XDR solutions may look costly, but recovering after the hack of all company’s assets costs more, both in monetary and reputational terms.

ShadowRay Vulnerability Threatens AI Workloads, No Patch Available

The post ShadowRay Vulnerability Threatens AI Workloads, No Patch Available appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/shadowray-vulnerability-uncovered/feed/ 0 20837
Shim Bootloader Vulnerability Affects Linux Systems https://gridinsoft.com/blogs/shim-bootloader-vulnerability/ https://gridinsoft.com/blogs/shim-bootloader-vulnerability/#respond Fri, 09 Feb 2024 09:01:59 +0000 https://gridinsoft.com/blogs/?p=19531 Researchers have identified a critical vulnerability in Shim, a widely-used Linux bootloader. This vulnerability could potentially allow attackers to execute malicious code and gain control of target systems before the kernel is even loaded. This flaw raises significant concerns because it can bypass security mechanisms. These mechanisms are typically enforced by the kernel and the… Continue reading Shim Bootloader Vulnerability Affects Linux Systems

The post Shim Bootloader Vulnerability Affects Linux Systems appeared first on Gridinsoft Blog.

]]>
Researchers have identified a critical vulnerability in Shim, a widely-used Linux bootloader. This vulnerability could potentially allow attackers to execute malicious code and gain control of target systems before the kernel is even loaded. This flaw raises significant concerns because it can bypass security mechanisms. These mechanisms are typically enforced by the kernel and the operating system.

What is a Shim Bootloader?

Shim serves as a small, open-source bootloader, crucial for facilitating the Secure Boot process on computers leveraging the Unified Extensible Firmware Interface (UEFI). It is signed with a Microsoft key, which is widely accepted by UEFI motherboards to verify the boot process’s integrity.

The vulnerability, discovered by Microsoft’s Bill Demirkapi, is found in Shim’s handling of HTTP boot operations. It allows for out-of-bounds write operations through manipulated HTTP responses.

Shim RCE Vulnerability Uncovered

The exploitation of CVE-2023-40547 (CVSS score: 9.8) involves creating specially crafted HTTP requests that lead to an out-of-bounds write. This flaw can be exploited in various ways, including remote code execution, network-adjacent, and local attacks. For instance, a remote attacker could intercept HTTP boot traffic through a Man-in-the-Middle attack. Meanwhile, a local attacker could modify EFI variables or use a live Linux USB. These actions could alter the boot process and allow the execution of privileged code.

The ability to execute code before the operating system loads presents a significant threat. It allows attackers to deploy stealthy bootkits that can undermine the security of the compromised system. This level of access grants attackers the ability to bypass traditional security controls and maintain persistent, undetected presence on the affected system.

Red Hat Fixes Shim RCE Flaw

In response to this vulnerability, RedHat issued a fix on December 5, 2023. Users of Shim, including major Linux distributions like Red Hat, Debian, Ubuntu, and SUSE, are urged to update to the latest version of Shim (v15.8), which addresses CVE-2023-40547 and other vulnerabilities. Additionally, users must update the UEFI Secure Boot DBX (revocation list). This update is necessary to prevent the execution of vulnerable Shim versions. It also ensures that the patched version is signed with a valid Microsoft key.

Applying a DBX update on Linux
Command to update DBX (Source: Eclypsium)

Linux becomes a more and more viable target for different malware families. Sure, it has been predominant in APT attacks for quite some time, as it is a backbone of server infrastructure. Though, an increased number of Linux malware in the form of ransomware, spyware and rootkits appear over the last few years, which is a rather worrying trend. The vulnerability like the one I’ve described above is nothing to mess around with – it may and will be exploited, sooner or later.

Shim Bootloader Vulnerability Affects Linux Systems

The post Shim Bootloader Vulnerability Affects Linux Systems appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/shim-bootloader-vulnerability/feed/ 0 19531
Sierra AirLink Vulnerabilities Expose Critical Infrastructure https://gridinsoft.com/blogs/sierra-airlink-21-vulnerabilities/ https://gridinsoft.com/blogs/sierra-airlink-21-vulnerabilities/#respond Wed, 06 Dec 2023 16:00:03 +0000 https://gridinsoft.com/blogs/?p=18200 The grand total of 21 security flaws was discovered in Sierra Wireless AirLink routers firmware. The vulnerabilities allow for remote code injection, unauthenticated access, DoS attacks, and else. As such network devices are commonly used in industrial manufacturing and applications the like, the impact of such attacks may be rather serious. Sierra AirLink Routers Have… Continue reading Sierra AirLink Vulnerabilities Expose Critical Infrastructure

The post Sierra AirLink Vulnerabilities Expose Critical Infrastructure appeared first on Gridinsoft Blog.

]]>
The grand total of 21 security flaws was discovered in Sierra Wireless AirLink routers firmware. The vulnerabilities allow for remote code injection, unauthenticated access, DoS attacks, and else. As such network devices are commonly used in industrial manufacturing and applications the like, the impact of such attacks may be rather serious.

Sierra AirLink Routers Have 21 Vulnerabilities

As Forescout Vedere researchers describe in their research, the AirLink lineup of devices contains 21 software vulnerabilities. Among them, only one issue got the CVSS score over 9, which is considered critical. RCE vulnerabilities and a couple of ones that may allow for unauthorized access are rated 8.1 to 8.8. Several other noteworthy issues, particularly ones that cause Denial of Service, are rated at CVSS 7.5.

Vulnerability Description CVSS Score
CVE-2023-41101 RCE vulnerability in OpenNDS 9.6 (Critical)
CVE-2023-38316 RCE vulnerability in OpenNDS 8.8
CVE-2023-40461 XSS vulnerability in ACEmanager 8.1
CVE-2023-40464 Unauthorized Access in ALEOS firmware 8.1
CVE-2023-40463 Unauthorized Access in ALEOS firmware 8.1

Researchers did a detailed description of the potential exploitation cases for two of the most critical vulnerabilities. For CVE-2023-41101, a hacker can take over the router by overflowing the buffer in OpenNDS captive portal. Using the lack of length limitation in GET requests, it is possible to make the router execute arbitrary code. By controlling the router, adversaries can disrupt the operations related to the mentioned interface.

CVE-2023-41101 exploitation

#2 in the list, CVE-2023-40463, requires an attacker to possess a router similar to the one it tries to attack. By digging through the device’s software elements and applying some hash cracking magic, it is possible to obtain the diagnostic shell password. Further, using a bit of social engineering, adversaries may connect to the actual router and enter its diagnostic interface using the password they’ve obtained earlier. With such access, it is possible to inject malware to the router, force it to malfunction, or execute your commands remotely.

Available Mitigations

Despite such a worrying amount of exploits, all of them allegedly receive a fix in the latest version of the firmware for AirLink devices. ALEOS 4.17.0 should address all the flaws, and, if some incompatibilities are in the way, customers may stick to version 4.9.9. The latter is not vulnerable to named vulnerabilities except for ones that touch OpenNDS captive portals.

Researchers who found all the issues also offer their own mitigation for the vulnerabilities that allow delaying the patch installation. Though, as it usually happens to all the stopgap solutions, they are not ideal and do not guarantee the effect.

  1. Disable unused captive portals and related services, or put them under restricted access. This reduces the attack surface for vulnerabilities that target OpenNDS.
  2. Use a web app firewall to filter the requests and block the packets of a suspicious source. This mitigation works against XSS and DoS vulnerabilities.
  3. Change the default SSL certificates. Forescout recommends doing this to all the routers, not only to Sierra Wireless ones.
  4. Implement an intrusion detection system that monitors IoT/OT devices as well. This allows for controlling both connections from outside the network and ones within it.

What are Sierra AirLink Routers?

Have you ever wondered, how does the Wi-Fi in a public transport function? Or how all the machinery in a huge workshop is connected and centrally managed even though it is not static? Well, Sierra’s devices are the answer. Their routers are industrial-grade wireless connectivity devices that are used in dozens of industries – starting from public transportation and all the way up to aerospace & defense.

Sierra Airlink stats by countries

What is particularly concerning for this story is the extensive use of AirLink routers in critical infrastructure. Factories, transportation – they are important, though not as continuously demanded as water treatment, emergency services and energy management. And since IoT more and more often attracts hackers’ attention, the actions should be taken immediately. Considering the extensive use of vulnerable AirLink devices in the US, it may be the perfect Achilles’ heel for cyberattacks that target critical infrastructure and even government.

The post Sierra AirLink Vulnerabilities Expose Critical Infrastructure appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/sierra-airlink-21-vulnerabilities/feed/ 0 18200
Cisco Won’t Fix an RCE Vulnerability in Old RV Routers https://gridinsoft.com/blogs/cisco-routers-vulnerability/ https://gridinsoft.com/blogs/cisco-routers-vulnerability/#comments Tue, 21 Jun 2022 13:14:43 +0000 https://gridinsoft.com/blogs/?p=8713 A 9.8/10 RCE Vulnerability in Old Cisco RV Routers Will Not Be Patched Cisco will not patch the zero-day CVE-2022-20825 vulnerability on end-of-life devices. The affected devices are Small Business RV routers (mobile routers for recreational vehicles and boats.) The specific vulnerable models are RV110W Wireless-N VPN Firewall, RV130 VPN Router, RV130W Wireless-N Multifunction VPN… Continue reading Cisco Won’t Fix an RCE Vulnerability in Old RV Routers

The post Cisco Won’t Fix an RCE Vulnerability in Old RV Routers appeared first on Gridinsoft Blog.

]]>
A 9.8/10 RCE Vulnerability in Old Cisco RV Routers Will Not Be Patched

Cisco will not patch the zero-day CVE-2022-20825 vulnerability on end-of-life devices. The affected devices are Small Business RV routers (mobile routers for recreational vehicles and boats.) The specific vulnerable models are RV110W Wireless-N VPN Firewall, RV130 VPN Router, RV130W Wireless-N Multifunction VPN Router, and RV215W Wireless-N VPN Router.

In its advisory, Cisco suggests users switch to newer models that receive all technical support and updates. For those who keep using the good old stuff, the manufacturer shows how to switch off the device remote control since the vulnerability only exists on routers with the remote management interface turned on (not a default config.) Going to Basic Settings => Remote Management and clearing the relevant tick box will be enough to secure the device, although it will lower its convenience level.

It’s no wonder the severity of vulnerability in question is rated 9.8x out of 10. It allows hackers to execute commands remotely bestowed with root privileges after sending a specially tailored request to the device. The lack of user input validation of the HTTP packets puts the four named router models in serious jeopardy

The post Cisco Won’t Fix an RCE Vulnerability in Old RV Routers appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/cisco-routers-vulnerability/feed/ 1 8713
A WSO2 Vulnerability is Fraught with Remote Code Execution https://gridinsoft.com/blogs/vso2-rce-vulnerability/ https://gridinsoft.com/blogs/vso2-rce-vulnerability/#respond Tue, 31 May 2022 22:04:00 +0000 https://gridinsoft.com/blogs/?p=8197 The products by WSO2, an open-source API, applications, and web services provider, have been attacked in the wild through the CVE-2022-29464 vulnerability detected back in April 2022. This vulnerability allows attackers to execute malicious code remotely via unhindered file uploading. The scheme of the attack begins with web shell installation through *.jsp or *.war files… Continue reading A WSO2 Vulnerability is Fraught with Remote Code Execution

The post A WSO2 Vulnerability is Fraught with Remote Code Execution appeared first on Gridinsoft Blog.

]]>
The products by WSO2, an open-source API, applications, and web services provider, have been attacked in the wild through the CVE-2022-29464 vulnerability detected back in April 2022.

This vulnerability allows attackers to execute malicious code remotely via unhindered file uploading.

The scheme of the attack begins with web shell installation through *.jsp or *.war files upload taking advantage of the CVE-2022-29464 vulnerability. As the web shell is installed, the attacker executes an arbitrary Java process with its help.

RELATED: Microsoft warns of growing number of attacks using web shells.

Attack scheme
Scheme of the attack. Image: Trend Micro

The results of the attack are the installation of a coin miner and Cobalt Strike beacon (backdoor.) The cryptocurrency miner is installed via the Java-process-launched wget command that installs the auto.sh file (the miner itself.) In the meantime, another part of the attack happens, also via the web shell. Java process calls a chmod command that modifies permissions to make it possible to run the process entitled “LBcgqCymZQhm” all through the same Java process. The process establishes an outbound connection to an IP address 179[.]60[.]150[.]29[.]4444, earlier tracked as a location involved in numerous Cobalt Strike attacks. Therefore, the LBcgqCymZQhm process is a Cobalt Strike backdoor beacon.

The most interesting thing is that the Cobalt Strike beacon, initially designed for Windows, turned out to be working on Linux during these attacks. That means the hackers have purposefully worked upon the backdoor’s compatibility with Linux.

The vulnerable software includes WSO2 API Manager 2.2.0 and above, Identity Server 5.2.0 and above, Identity Server Analytics 5.4.0 -5.6.0, Identity Server as a Key Manager 5.3.0 and above, Open Banking AM 1.4.0 and above, and Enterprise Integrator 6.2.0 and above. The patch is already there, so all users of the mentioned programs are advised to patch the flaws in question ASAP.

The multiple WSO2 clients belong to many industries, vital ones included. For example, healthcare, financial sector, energy, education, communications, and government. Needless to say, should the hackers exploit the CVE-2022-29464 vulnerability against unpatched systems, the consequences of the attack could be drastic.

A WSO2 Vulnerability is Fraught with Remote Code Execution

The post A WSO2 Vulnerability is Fraught with Remote Code Execution appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/vso2-rce-vulnerability/feed/ 0 8197
Dark Souls 3 found an RCE vulnerability that allows taking control of someone else’s PC https://gridinsoft.com/blogs/rce-vulnerability-in-dark-souls/ https://gridinsoft.com/blogs/rce-vulnerability-in-dark-souls/#respond Mon, 24 Jan 2022 22:09:14 +0000 https://gridinsoft.com/blogs/?p=6963 Over the weekend, the developers of the Dark Souls series of games reported that the PC servers of Dark Souls: Remastered, Dark Souls 2, Dark Souls 3 and Dark Souls: PtDE are temporarily disabled due to a dangerous RCE vulnerability that allows remotely taking control of someone else’s machine. One of the first to report… Continue reading Dark Souls 3 found an RCE vulnerability that allows taking control of someone else’s PC

The post Dark Souls 3 found an RCE vulnerability that allows taking control of someone else’s PC appeared first on Gridinsoft Blog.

]]>
Over the weekend, the developers of the Dark Souls series of games reported that the PC servers of Dark Souls: Remastered, Dark Souls 2, Dark Souls 3 and Dark Souls: PtDE are temporarily disabled due to a dangerous RCE vulnerability that allows remotely taking control of someone else’s machine.

One of the first to report the problem was Dexerto, which said that an exploit for this vulnerability was demonstrated to the general public right during a Twitch stream.

PvP servers for Dark Souls 3, Dark Souls 2, and Dark Souls: Remastered have been temporarily deactivated to allow the team to investigate recent reports of an issue with online services. Servers for Dark Souls: PtDE will join them shortly. We apologize for this inconvenience. Dark Souls developers wrote.

Streamer The__Grim__Sleeper was playing Dark Souls 3, and already at the end of the stream (1:20:22) something incomprehensible began to happen to his computer. At first, the game just crashed over and over again, and then suddenly Microsoft’s automatic text-to-speech turned on, and the synthesized voice began to criticize the streamer’s gameplay.

The__Grim__Sleeper was very surprised and reported that Microsoft PowerShell opened by itself, that is, the hacker used it to run a script that activated the text-to-speech function.

Apparently, the streamer was not just a victim of a random troll. According to a screenshot from Discord SpeedSouls, the hacker discovered the vulnerability some time ago and tried to contact the FromSoftware developers about it, but was ignored, so he started hacking streamers in an attempt to draw attention to the problem.

RCE vulnerability in Dark Souls

According to a post on Reddit, the anti-cheat Blue Sentinel, developed by the fans of the game, has already been updated and is able to prevent the exploitation of the vulnerability. The same post argues that rumours circulating in the network about the leakage of the exploit is a lie, because only four people knew how to exploit this vulnerability, two of which were the developers of Blue Sentinel, and the other two were people who helped “work on it”. Most likely, we are talking about those who initially discovered the bug.

The developers and representatives of Bandai Namco, the publisher of Dark Souls, have not yet announced how long the game servers will be down, but it is clear that work is already underway to fix the vulnerability. Separately, it is emphasized that the shutdown does not apply to PvP servers, as well as servers for the Xbox and PlayStation.

Let me remind you that we reported that Valve was unable to fix an RCE vulnerability in the Source engine for a long time, and also that Tencent and Chinese police conducted a joint operation against game cheat developers.

The post Dark Souls 3 found an RCE vulnerability that allows taking control of someone else’s PC appeared first on Gridinsoft Blog.

]]>
https://gridinsoft.com/blogs/rce-vulnerability-in-dark-souls/feed/ 0 6963