Article Details
Scrape Timestamp (UTC): 2024-12-13 16:53:53.062
Source: https://thehackernews.com/2024/12/critical-openwrt-vulnerability-exposes.html
Original Article Text
Click to Toggle View
Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection. A security flaw has been disclosed in OpenWrt's Attended Sysupgrade (ASU) feature that, if successfully exploited, could have been abused to distribute malicious firmware packages. The vulnerability, tracked as CVE-2024-54143, carries a CVSS score of 9.3 out of a maximum of 10, indicating critical severity. Flatt Security researcher RyotaK has been credited with discovering and reporting the flaw on December 4, 2024. The issue has been patched in ASU version 920c8a1. "Due to the combination of the command injection in the imagebuilder image and the truncated SHA-256 hash included in the build request hash, an attacker can pollute the legitimate image by providing a package list that causes the hash collision," the project maintainers said in an alert. OpenWrt is a popular open-source Linux-based operating system for routers, residential gateways, and other embedded devices that route network traffic. Successful exploitation of the shortcoming could essentially allow a threat actor to inject arbitrary commands into the build process, thereby leading to the production of malicious firmware images signed with the legitimate build key. Even worse, a 12-character SHA-256 hash collision associated with the build key could be weaponized to serve a previously built malicious image in the place of a legitimate one, posing a severe supply chain risk to downstream users. "An attacker needs the ability to submit build requests containing crafted package lists," OpenWrt noted. "No authentication is required to exploit the vulnerabilities. By injecting commands and causing hash collisions, the attacker can force legitimate build requests to receive a previously generated malicious image." RyotaK, who provided a technical breakdown of the bug, said it's not known if the vulnerability was ever exploited in the wild because it has "existed for a while." Users are recommended to update to the latest version as soon as possible to safeguard against potential threats.
Daily Brief Summary
A severe vulnerability in OpenWrt's Attended Sysupgrade (ASU) could allow attackers to distribute malicious firmware.
Discovered by RyotaK and reported on December 4, 2024, the vulnerability is noted for its high potential impact (CVSS score of 9.3).
The flaw involves a combination of command injection and truncated SHA-256 hash collision, facilitating unauthorized command execution during firmware builds.
This security gap enables the creation of illegitimate firmware images under the guise of legitimate updates, posing significant threats to users.
No authentication is required to exploit this vulnerability, increasing the risk of potential abuse by attackers.
OpenWrt has already released a patch (version 920c8a1) to address this vulnerability and recommends users update immediately.
It remains uncertain if the vulnerability was exploited in the wild, but its presence in older versions poses past risks.