SSH-Agent RCE, CTFs & bug bounties, Satellite Security, Cyber Trust Mark, Bad.Build – ASW #248
RCE in ssh-agent forwarding, finding zero-days in CTFs, Node's vm2 can't be secured, NPM packaging ambiguities, privilege escalation in Google's Cloud Build, putting satellite security into low-earth analysis, FCC proposes a trust mark, and more!
Announcements
Join us at an upcoming Official Cyber Security Summit in a city near you! This series of one-day, invitation-only, executive level conferences are designed to educate senior cyber professionals on the latest threat landscape.
We are pleased to offer our listeners $100 off admission when you use code SecWeek23 to register.
Visit securityweekly.com/cybersecuritysummit to learn more and register today!
Hosts
- 1. CVE-2023-38408: Remote Code Execution in OpenSSH’s forwarded ssh-agent
While the exploit scenario may be low risk, the effort and write-up for this exploit is highly informative. It also highlights how many libraries could benefit from further hardening to prevent them from being leveraged in an attack like this.
- 2. Google says Apple employee found a zero-day but did not report it | TechCrunch
Here's a curious situation that emerged from a CTF. A participant identified and exploited a zero-day in Chromium. However, only later did a CTF organizer -- not the original researcher -- report the bug to the project and receive a $10K bounty for it. The situation is probably more notable for how onlookers interpret this example as a success or struggle for bug bounty programs.
- 3. GitHub – patriksimek/vm2: Advanced vm/sandbox for Node.js
A project shutting down because "we now find ourselves facing an escape so complicated that fixing it seems impossible."
Fortunately, there are more secure alternatives. It must be hard to close a project that's gone for so long, but it's commendable to know when risk can't be effectively addressed. I wonder how much security could be improved within organizations by getting rid of systems and code quickly rather than letting them linger in insecure states.
- 4. Bad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attack
More consequences of IAM complexity and security researchers poking at cloud configurations.
- 5. Google’s AI Red Team: the ethical hackers making AI safer
Nothing too exciting or new in this list. What's curious is seeing overlaps and gaps with other lists we've covered on the show like the OWASP AI Security and Privacy Guide.
- 6. The massive bug at the heart of the npm ecosystem
This is a bit older (from June), but I wanted to bring it up in relation to industry talk of SBOMs and supply chains. We need reliable information about packages or we may need scanners to just keeping inspecting packages rather than relying on what they say they contain.
- 7. CISA Develops Factsheet for Free Tools for Cloud Environments
It's great to see lists of recommended tools, especially open source ones that can help with cloud security. But...I'm not too excited about this list?
I'm curious how these in particular were chosen. Of course, your cloud security strategy should rely on security practices and frameworks, with tools assisting the implementation (and scaling) of that strategy. But this list feels a bit distant from good strategies. As a question for our listeners, what should a list contain that would be organized by cloud security posture, baselines, monitoring, and incident response?
p.s. yes, it's still funny and fun to see untitled goose tool make a list like this -- we've come a long way from tool names like SATAN.
- 8. EDUCATION: Orange-Cyberdefense/awesome-industrial-protocols
I learned a lot of infosec by studying protocols -- TCP/IP, DNS, UDP, HTTP, and a few other more obscure or long-forgotten ones. So, this resource was sure to catch my eye.
This reference isn't for everyone. But if you're interested in reading about protocols and reasoning about potential flaws (aka threat modeling), this would make for a good time. Many of the implementations are also probably great targets for fuzzing and just waiting for more vulns to be identified. One drawback just being the potential difficulty of setting up or finding environments for testing. Considering that this summer's Black Hat promises to bring more BGP protocol issues to light, there's no reason to ignore the ones that show up on this list.
- 9. Fuzz Introspector: optimizing fuzzing workflows – Open Source Security Foundation
More efficient fuzzing in order to find more bugs -- security or otherwise!
- 1. Space Odyssey: An Experimental Software Security Analysis of Satellites
Some researchers took a look at satellites and their firmware, and were left unimpressed. Part of what's interesting here is that the security through obscurity worked until recent years, where ground stations - the earth-part that talks to the satellite - have become financially accessible for individuals to purchase, or they can just rent them from AWS or Azure.
In this paper the researchers go over a variety of flaws found after re-creating firmware setups in their lab and doing some "experimental testing." Most of the work focused around smaller cube sats, which might be partially why there's more security issues (cheaper, smaller satellites may mean smaller security budgets)
(h/t Wired)
- 2. FCC working on cyber security label
The FCC is working on the "US Cyber Trust Mark," which would allow consumers to have a better sense of the security of a "device" and "product"(eg device + cloud). I like the use of those two phrases, as frequently people seem to think about the security of an IOT thing without thinking about what it's connecting to.
- 3. Unauthenticated RCE on an oscilloscope
For those in the hardware space, seeing the title here might make one first think of "Rigol," as the community is fond of hacking these devices, and that would be a correct guess in this case.
This has a neat walkthrough of how you get the firmware, emulate it, and work on finding a vulnerability (in the web interface, in this case).
(h/t hackaday)
- 4. Tetraburst – vulnerabilities and backdoors in commercial radios
Terrestrial Trunked Radio is a system used by "globally" by law enforcement, military, critical infrastructure. The security of this system was kept behind closed doors until some researchers recently got access. Along with finding a collection of vulnerabilities, they also found a backdoor in the system.