Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Wednesday April 01 2020, @07:33PM   Printer-friendly
from the now-it's-extra-configurable! dept.

Dan Goodin over at Ars Technica is reporting about an OpenWRT vulnerability in its package manager, opkg.

From the article:

For almost three years, OpenWRT—the open source operating system that powers home routers and other types of embedded systems—has been vulnerable to remote code-execution attacks because updates were delivered over an unencrypted channel and digital signature verifications are easy to bypass, a researcher said.

[...] Security researcher Guido Vranken, however, recently found that updates and installation files were delivered over unencrypted HTTPs[sic] connections, which are open to attacks that allow adversaries to completely replace legitimate updates with malicious ones. The researcher also found that it was trivial for attackers with moderate experience to bypass digital-signature checks that verify a downloaded update as the legitimate one offered by OpenWTR maintainers. The combination of those two lapses makes it possible to send a malicious update that vulnerable devices will automatically install.

[...] These code-execution exploits are limited in their scope because adversaries must either be in a position to conduct a man-in-the-middle attack or tamper with the DNS server that a device uses to find the update on the Internet.

[...] Exploiting these weaknesses, Vranken was able to create a server that impersonated downloads.openwrt.org and served a malicious update. As long as the malicious file is the same size at the legitimate file, it will be executed by a vulnerable device.

Vranken backs up his claims in a blog post where he provides a proof-of-concept exploit against OpenWRT devices.

The checksum bypass vulnerability in OpenWRT's opkg has been assigned CVE-2020-7982.

Affected versions:
18.06.0-18.06.6
19.07.0
LEDE 17.01.0-17.01.7.

Original blog post with discussion and exploit code
OpenWRT Advisory for this vulnerability

OpenWRT is a Linux distro focused on embedded devices, supports a a variety of SoCs, and is widely used on home routers.


Original Submission

Related Stories

Banana Pi Launches $30 OpenWRT Wi-Fi 6 Router With WPA3 Protection, Optional PoE 13 comments

Banana Pi's low-cost router supports 2.5G+5G WiFi with LAN ports:

Banana Pi is now selling a fully built Wi-Fi 6 router with some solid features for just $30 excluding shipping via Ali Express. This router uses OpenWRT firmware and dual-core Arm A9 Processor-based Triductor TR6560 SoC with Triductor's TR5220 WiFi 6 chipset.

The company has been selling this WiFi 6 router board on its own, but now you can buy an out-of-box unit that contains an enclosure for the board with six external antennas, Ethernet cables, and a power adapter with either EU or US plugs. The only difference here is that one of the LAN ports is removed.

[...] The router supports the 802.11ax bandwidth protocol and provides WPA3 password protection. Power over Ethernet is optional and can be added via a module, but it needs to be soldered. Banana Pi's wiki page specifies that its 2.4G signal works up to 40 meters to provide 573.5 Mbps bandwidth and 5G works up to 160 meters up to 2,401.9 Mbps.

Read the specs here.

Related:


Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 2) by exaeta on Wednesday April 01 2020, @07:44PM (6 children)

    by exaeta (6957) on Wednesday April 01 2020, @07:44PM (#978135) Homepage Journal
    Are they THIS inept? really? Seriously?
    --
    The Government is a Bird
    • (Score: 2) by pvanhoof on Wednesday April 01 2020, @07:53PM (2 children)

      by pvanhoof (4638) on Wednesday April 01 2020, @07:53PM (#978137) Homepage

      OpenWRT should stop trying to make their own package manager, and simply adopt dpkg. The reasons behind ipkg and later opkg were trying to safe a few megabytes of memory.

      Those reasons are irrelevant nowadays.

      Whatever the extremist think of it: each and every router nowadays has at least a few hundred megabytes of RAM. If not gigabytes.

      • (Score: 2) by exaeta on Wednesday April 01 2020, @08:47PM

        by exaeta (6957) on Wednesday April 01 2020, @08:47PM (#978154) Homepage Journal
        DPKG is bloated. But a half decent programmer should be able to come up with something better than http for sharing data...
        --
        The Government is a Bird
      • (Score: 1, Informative) by Anonymous Coward on Thursday April 02 2020, @12:44AM

        by Anonymous Coward on Thursday April 02 2020, @12:44AM (#978197)

        "each and every router nowadays has at least a few hundred megabytes of RAM. If not gigabytes"
        Not true, and flash is the more limited resource.

    • (Score: 2) by rigrig on Wednesday April 01 2020, @08:46PM (1 child)

      by rigrig (5129) Subscriber Badge <soylentnews@tubul.net> on Wednesday April 01 2020, @08:46PM (#978153) Homepage

      Yes, even here they only fixed the checksum parser and not the validation: once the parser breaks again it will still happily install packages for which no checksum was found.

      --
      No one remembers the singer.
      • (Score: 2) by exaeta on Thursday April 02 2020, @02:49PM

        by exaeta (6957) on Thursday April 02 2020, @02:49PM (#978318) Homepage Journal
        Why, opkg, why? I could write a package manager myself that does better than this, sheesh.
        --
        The Government is a Bird
    • (Score: 0) by Anonymous Coward on Wednesday April 01 2020, @09:57PM

      by Anonymous Coward on Wednesday April 01 2020, @09:57PM (#978168)

      Here is someone performing the exploit live and pwning some n00bs: https://www.youtube.com/watch?v=dQw4w9WgXcQ [youtube.com]

  • (Score: 1, Informative) by Anonymous Coward on Wednesday April 01 2020, @08:22PM

    by Anonymous Coward on Wednesday April 01 2020, @08:22PM (#978143)

    To fix this issue, upgrade to the latest OpenWrt version. The fix is contained in the following and later OpenWrt releases:

    OpenWrt master: 2020-01-29 reboot-12146-gc69c20c667
    OpenWrt 19.07: 2019-01-29 v19.07.1-1-g4668ae3bed
    OpenWrt 18.06: 2019-01-29 v18.06.7-1-g6bfde67581

    The fixed opkg package will carry the version 2020-01-25.

  • (Score: 3, Insightful) by RamiK on Wednesday April 01 2020, @08:42PM (3 children)

    by RamiK (1813) on Wednesday April 01 2020, @08:42PM (#978152)

    These code-execution exploits are limited in their scope because adversaries must either be in a position to conduct a man-in-the-middle attack or tamper with the DNS server that a device uses to find the update on the Internet.

    Seeing how Openwrt is running on your router, that only leaves infrastructure level man-in-the-middle a.k.a. state actors a.k.a. the $5 wrench [xkcd.com] guys.

    --
    compiling...
    • (Score: 0) by Anonymous Coward on Wednesday April 01 2020, @10:47PM (2 children)

      by Anonymous Coward on Wednesday April 01 2020, @10:47PM (#978175)

      Automating the exploitation of devices drives down the cost of extracting information far below $5. So why wouldn't they?

      • (Score: 0) by Anonymous Coward on Wednesday April 01 2020, @11:00PM (1 child)

        by Anonymous Coward on Wednesday April 01 2020, @11:00PM (#978177)

        If you reuse the wrench, you'll save billions!

        • (Score: 3, Funny) by petecox on Wednesday April 01 2020, @11:07PM

          by petecox (3228) on Wednesday April 01 2020, @11:07PM (#978179)

          Just tell the fascist goons you have the virus and they won't come within 2 metres.

          And if you can't get out of the way of a flying wrench, you're obviously not Dodgeball material.

(1)