Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Privacy

Bleedingbit Zero-Day Chip Flaws May Expose Majority of Enterprises To Remote Code Execution Attacks (zdnet.com) 55

Two new zero-day vulnerabilities called "Bleeding Bit" have been revealed by security firm Armis, impacting Bluetooth Low-Energy (BLE) chips used in millions of Cisco, Meraki, and Aruba wireless access points (APs). "Developed by Texas Instruments (TI), the vulnerable BLE chips are used by roughly 70 to 80 percent of business wireless access points today by way of Cisco, Meraki and Aruba products," reports ZDNet. From the report: The first vulnerability, CVE-2018-16986, impacts Cisco and Meraki APs using TI BLE chips. Attacks can remotely send multiple benign BLE broadcast messages, called "advertising packets," which are stored on the memory of the vulnerable chip. As long as a target device's BLE is turned on, these packets -- which contain hidden malicious code to be invoked later on -- can be used together with an overflow packet to trigger an overflow of critical memory. If exploited, attackers are able to trigger memory corruption in the chip's BLE stack, creating a scenario in which the threat actor is able to access an operating system and hijack devices, create a backdoor, and remotely execute malicious code.

The second vulnerability, CVE-2018-7080, is present in the over-the-air firmware download (OAD) feature of TI chips used in Aruba Wi-Fi access point Series 300 systems. The vulnerability is technically a leftover development backdoor tool. This oversight, the failure to remove such a powerful development tool, could permit attackers to compromise the system by gaining a foothold into a vulnerable access point. "It allows an attacker to access and install a completely new and different version of the firmware -- effectively rewriting the operating system of the device," the company says. "The OAD feature doesn't offer a security mechanism that differentiates a "good" or trusted firmware update from a potentially malicious update."

This discussion has been archived. No new comments can be posted.

Bleedingbit Zero-Day Chip Flaws May Expose Majority of Enterprises To Remote Code Execution Attacks

Comments Filter:
  • "Developed by Texas Instruments (TI), the vulnerable BLE chips are used by roughly 70 to 80 percent of business wireless access points today by way of Cisco, Meraki and Aruba products," reports ZDNet.

    Of course, it's entirely likely you're not affected by the compromised chips.

    So you can take the reassuring route of "Clearly, that vulnerability clearly affects folks other than me, so I'm righteously Dunning-Kruger in my examination of the evidence that might suggest I'm super, duper, special.

    • by JBMcB ( 73720 )

      Of course, it's entirely likely you're not affected by the compromised chips.

      So you can take the reassuring route of "Clearly, that vulnerability clearly affects folks other than me, so I'm righteously Dunning-Kruger in my examination of the evidence that might suggest I'm super, duper, special.

      The corollary to that is: "zOMG ZERO DAY IN YOUR ROUTERS!!! IT COULD BE YOU!!! CLICK HERE FOR MORE INFOS!!!!"

      Meanwhile it's a vulnerability in some brain-dead feature nobody uses and you have to be standing next to the router to exploit it. My personal favorites are the exploits that require physical access to the machine to plug something in.

      • by sjames ( 1099 )

        The difference between physical access and nearby is huge. The former offers a much greater risk of being caught red-handed. The latter is nearly impossible to prove.

        Meanwhile, a good antenna can increase the range a fair amount.

  • Comment removed based on user account deletion
    • Except one of these vulnerabilities is exactly what you're complaining about.
      The ability to allow any code to be uploaded was accidentally left enabled, allowing anyone within radio range to load any code they wish.

    • Re: (Score:3, Insightful)

      by sjames ( 1099 )

      Reflashing should require setting a physical jumper.

      • So to upgrade the firmware in these enterprise outdoor access points, they should send a guy on site up a pole, take the thing down, open it up, insert the jumper, upgrade the firmware, reassemble it and then reinstall it outside? For each of the hundred devices they have?
        Even the indoor AP's in my building would be a costly nightmare. There's 10 floors with at least 6 AP's on the roof of each floor.

        • by sjames ( 1099 )

          It's up to you, you can balance the risk/reward as you see fit.

          For example, you might prefer to change the bootloader so it will flash an image you signed without the jumper, but require the jumper to change the signing key.

          Or, since the firmware I'm referring to is for the BLE module, (not the entire AP), you could just leave it as is with the jumper off..

      • Would it not be preferable to just have the motherboard require a switch accessible by users when the case is fully assembled set to allow firmware updates?
        • by sjames ( 1099 )

          That would be up to the manufacturer that incorporates the BLE module into the product.

      • by AmiMoJo ( 196126 )

        A lot of these devices don't even store the firmware themselves any more. They just have a bootloader and the firmware is loaded every time they are powered up.

        • by sjames ( 1099 )

          True, some don't, but the TI devices do have their own flash for firmware.

    • by skids ( 119237 )

      I'd love to get that horse back in the barn, but considering the tech docs for these chipsets are not released to customers, we'd have to round up the pony as well. You can hope the chips behave like some similar design but you never know if there's one register in there wired up differently on a device made custom fr a manufacturer.

      Also in this specific case they can hide behind the fact that the chipsets participate in RF and thus amateur firmware could cause illegal interference, so there's a mule out i

  • Say what now? (Score:5, Informative)

    by coofercat ( 719737 ) on Friday November 02, 2018 @08:22AM (#57580300) Homepage Journal

    I had to look at TFA to find out that:

    1) It has an auto-play video. Another to add to your blocker's blacklist

    2) BLE chips are used for IoT connectivity. I assume the Access Points run wifi for your phones and laptops and Bluetooth (LE) for your IoT devices. If you don't have any IoT, you don't need the BLE functionality (there may be a way to turn it off in these products, but knowing Cisco, you can turn the functionality off but it won't protect you from the vulnerability).

    In other words... IoT is a sack of insecure shite. If the device itself doesn't have vulnerabilities, the AP will. Great.

You will lose an important disk file.

Working...