TranslateProject/sources/talk/20190731 Remote code execution is possible by exploiting flaws in Vxworks.md
DarkSun 5ce84594a8 选题: 20190731 Remote code execution is possible by exploiting flaws in Vxworks
sources/talk/20190731 Remote code execution is possible by exploiting flaws in Vxworks.md
2019-08-01 01:00:00 +08:00

6.7 KiB
Raw Blame History

Remote code execution is possible by exploiting flaws in Vxworks

Thinkstock

Eleven zero-day vulnerabilities in WindRivers VxWorks, a real-time operating system in use across an advertised 2 billion connected devices have been discovered by network security vendor Armis.

Six of the vulnerabilities could enable remote attackers to access unpatched systems without any user interaction, even through a firewall according to Armis.

About IoT:

The vulnerabilities affect all devices running VxWorks version 6.5 and later with the exception of VxWorks 7, issued July 19, which patches the flaws. That means the attack windows may have been open for more than 13 years.

Armis Labs said that affected devices included SCADA controllers, patient monitors, MRI machines, VOIP phones and even network firewalls, specifying that users in the medical and industrial fields should be particularly quick about patching the software.

Thanks to remote-code-execution vulnerabilities, unpatched devices can be compromised by a maliciously crafted IP packet that doesnt need device-specific tailoring, and every vulnerable device on a given network can be targeted more or less simultaneously.

The Armis researchers said that, because the most severe of the issues targets “esoteric parts of the TCP/IP stack that are almost never used by legitimate applications,” specific rules for the open source Snort security framework can be imposed to detect exploits.

VxWorks, which has been in use since the 1980s, is a popular real-time OS, used in industrial, medical and many other applications that require extremely low latency and response time. While highly reliable, the inability to install a security agent alongside the operating system makes it vulnerable, said Armis, and the proprietary source code makes it more difficult to detect problems.

[ Prepare to become a Certified Information Security Systems Professional with this comprehensive online course from PluralSight. Now offering a 10-day free trial! ]

Armis argued that more attention has to be paid by security researchers to real-time operating systems, particularly given the explosive growth in IoT usage for one thing, the researchers said, any software that doesnt get thoroughly researched runs a higher risk of having serious vulnerabilities go unaddressed. For another, the critical nature of many IoT use cases means that the consequences of a compromised device are potentially very serious.

“It is inconvenient to have your phone put out of use, but its an entirely different story to have your manufacturing plant shut down,” the Armis team wrote. “A compromised industrial controller could shut down a factory, and a pwned patient monitor could have a life-threatening effect.”

In addition to the six headlining vulnerabilities, five somewhat less serious security holes were found. These could lead to consequences ranging from denial of service and leaked information to logic flaws and memory issues.

More technical details and a fuller overview of the problem can be found at the Armis Labs blog post here, and there are partial lists available of companies and devices that run VxWorks available on Wikipedia and at Wind Rivers customer page. Wind River itself issued a security advisory here, which contains some potential mitigation techniques.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.


via: https://www.networkworld.com/article/3428996/remote-code-execution-is-possible-by-exploiting-flaws-in-vxworks.html

作者:Jon Gold 选题:lujun9972 译者:译者ID 校对:校对者ID

本文由 LCTT 原创编译,Linux中国 荣誉推出