RFID hacking & More Vulnerability Shenanigans – Iceman – PSW #834
Full Audio
View Show IndexSegments
1. More Vulnerability Shenanigans – PSW #834
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows.
Announcements
Maximize your investment at BlackHat 2024 with a 1:1 on-site interview. Drive thought leadership and boost brand awareness with CyberRisk Alliance's expert editorial team from Security Weekly and SC Media. Act now, limited interview slots available - secure yours today at https://securityweekly.com/blackhat2024
Hosts
- 1. OpenVPN Addresses False Zero-Day Claims, Releases Security Patches
- 2. Microsoft Researcher to Unveil 4 OpenVPN Zero-Day Vulnerabilities at Black Hat USA 2024
- 3. New OpenSSH Vulnerability CVE-2024-6409 Exposes Systems to RCE Attack
- 4. No more boot loader: Please use the kernel instead DevConf.CZ
- 5. MITRE Announces Strategic Partnership with Atlantic Council to Enhance Transatlantic Security
- 6. AMD engineer discusses AMD’s ‘Layoff Bug’ — infamous Barcelona CPU bug revisited 16 years later
- 7. Traeger Grill D2 Wi-Fi Controller, Version 2.02.04 Advisory
- 8. Product Security Review Methodology for Traeger Grill Hack
- 9. Unpatched Gogs Vulnerabilities: A Ticking Time Bomb for Source Code
- 10. CISA adds Cisco NX-OS Command Injection bug to its Known Exploited Vulnerabilities catalog
- 11. Supreme Court Ruling Threatens the Framework of Cybersecurity Regulation
- 12. Vulnerabilities in PanelView Plus devices could lead to remote code execution
- 13. Emergency patches now available for Juniper Networks routers
"The authentication bypass bug, tracked as CVE-2024-2973, scored a perfect 10 rating on both the CVSS 3.1 and CVSS 4 systems, illustrating the seriousness of the issue." - While not (yet) observed in the wild this one has a perfect 10 CVSS score, patches were released out-of-cycle, and there is no workaround. The good news is the patch will only result in 30 seconds of downtime and is only exploitable on routers that run in high-availability mode. Pretty easy to recommend that people just fix this one.
- 14. Threat actors actively exploit D-Link DIR-859 router flaw
The slight variation provides all of the usernames and passwords on the device: "GreyNoise observed a slight variation in-the-wild which leverages the vulnerability to render a different PHP file to dump account names, passwords, groups, and descriptions for all users of the device. At the time of writing we are not aware of the motivations to disclose/collect this information and are actively monitoring it" - The device in question is EOL, which is not just adding to the list of stuff attackers are now using to build IoT botnets.
- 15. RCE vulnerability in OpenSSH: everything you need to know
"Based on what is currently known about this vulnerability, Wiz Research estimates that widespread exploitation is unlikely. Our reasoning is that currently known exploitations rely on distribution-specific conditions (ASLR for example) and glibc-version-specific struct layouts, which means an attacker must know in advance what Linux distribution they are targeting in order to build a functional exploit. This requirement makes the vulnerability inappropriate for widespread opportunistic exploitation. " - I'm still going with make sure you patch this one. For production Linux servers that are monitored, probably less important as you can put other countermeasures in place. For appliances/embedded OS/IoT, I believe this will be more problematic. Typically these devices have low visibility, making the SSH attack fly under the radar.
- 16. Willy – a Flipper Zero alternative
These look really cool! I just discovered another potential Flipper Zero alternative: https://github.com/pr3y/Bruce - Currently have it loaded on one of my cardputers, and looking into the expansion modules to give it more functionality (See the wiki for this project for more information).
- 17. Cloudflare’s 1.1.1.1 DNS Service Disrupted by BGP Hijacking and Route Leak
This makes me want to just run all of my own DNS. Joff was right!
- 18. BLAST RADIUS
"Our attack identifies a protocol vulnerability in the way RADIUS uses MD5 that allows the attacker to inject a malicious protocol attribute that produces a hash collision between the server-generated Response Authenticator and the attacker's desired forged response packet...In addition, because our attack is online, the attacker needs to be able to compute a so-called chosen-prefix MD5 collision attack in minutes or seconds. The previous best reported chosen-prefix collision attack times took hours, and produced collisions that were not compatible with the RADIUS protocol.
- 19. New Intel CPU Vulnerability ‘Indirector’ Exposes Sensitive Data
I've not seen or heard about speculative execution attacks occurring the wild, therefore, many just give these a really low priority. Is this true? Are attackers using them? If so, or not, how would we detect them?
- 20. Dev rejects CVE severity, makes his GitHub repo read-only
This happened to the node-ip project, 17 million downloads weekly. Someone filed a CVE for a bug that does not have a security impact and has also been fixed. The Github repo switched to read-only mode as they were getting so many comments and such. This vulnerability reporting problem is still a mess. Crux of the issue is here: "While I didn't really intend the module to be used for any security related checks, I'm very curious how an untrusted input could end up being passed into ip.isPrivate or ip.isPublic [functions] and then used for verifying where the network connection came from."
- 21. Use-after-free vulnerability in lighttpd version 1.4.50 and earlier – VU#312260
The CVE is from 2018, yet this is still a current issue? I'm still trying to unravel this one. So weird: "However, a CVE ID was not obtained as part of the fix outlined above, leaving the vulnerability without a public identifier. In April of 2024, Binarly discovered that the lighttpd vulnerability was still present in a number of products, presenting a supply-chain risk. The lack of CVE ID rendered the security fix invisible to projects that utilize earlier versions of lighttpd. Many organizations depend on a public CVE ID record to initiate security fixes and apply software updates. Binarly also documented many implementations of lighttpd (versions 1.4.50 and earlier) that allowed for a different set of attacks that can leak memory and access sensitive data. The supply-chain impact of this vulnerable software includes multiple products as highlighted in the blog by runZero. The lighttpd project has now obtained CVE-2018-25103 to identify this vulnerability and to alert supply-chain partners to implement the required fix."
- 1. Bats Can No Longer Haunt Apple VR Headsets Via Web Exploit
- 2. CVE-2024-30078 – Security Update Guide – Microsoft – Windows Wi-Fi Driver Remote Code Execution Vulnerability
- 3. Uncovering Secrets Of Logitech M185’s Dongle
- 4. USB HID Down the rabbit hole: Reverse engineering the Logitech CU0019 USB receiver
- 5. Long Range Hacking by Daniel Dieterle
- 6. A Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask
- 7. The West Coast’s Fanciest Stolen Bikes Are Getting Trafficked by One Mastermind in Jalisco, Mexico
- 8. Llama.ttf Is AI, In A Font
- 9. Smartwatch Snitches On Itself And Enables Reverse Engineering
- 10. Long-Term OctoPrint Stat Manipulation Uncovered
2. RFID hacking – Iceman . – PSW #834
Iceman comes on the show to talk about RFID and NFC hacking including the tools, techniques, and hardware. We'll also talk about the ethics behind the disclosure of vulnerabilities and weaknesses in these systems that are used in everything from building access to cars.
Segment Resources:
- Youtube channel - https://www.youtube.com/@iceman1001
- Proxmark3 forums - http://www.proxmark.org/forum/index.php
- Proxmark3 Repository - https://github.com/rfidresearchgroup/proxmark3
- Awesome RFID talks - https://github.com/doegox/awesome-rfid-talks
Announcements
You're invited to InfoSec World 2024 at Disney’s Coronado Springs Resort in Lake Buena Vista, FL, from September 23-25. Join top cybersecurity experts for this premier event! Save 25% on your pass by using code ISW24-SW25 when you register at securityweekly.com/infosecworld2024. Don’t miss out on this exclusive opportunity!
Guest
Christian Herrmann, better known throughout the hacker community as “Iceman”, is a co-founder of RRG and helped produce many of the most common RFID research tools available today including the Proxmark3 RDV4, and Chameleon Mini. He is an RFID hacking and Proxmark3 evangelist, serving the RFID community as both forum administrator and major code-contributor alongside other community developers since 2013. He has spoken at hacker conferences around the world including DEF CON, NullCon, Pass-the-Salt, BlackAlps and SaintCon
He has provided bespoke software development services for over 14 years specializing in .NET platforms, and is a Certified MCPD Enterprise Architect.
Christian Hermann has nearly unmatched knowledge of Proxmark3 architecture and a variety of RFID technologies, and was an instructor for the Red Team Alliance (RTA) during which also included Black Hat trainings.