Ruijie Networks’ Cloud Platform Flaws Might Expose 50,000 Units to Distant Assaults

Dec 25, 2024Ravie LakshmananCloud Security / Vulnerability

Cybersecurity researchers have found a number of safety flaws within the cloud administration platform developed by Ruijie Networks that would allow an attacker to take management of the community home equipment.

“These vulnerabilities affect both the Reyee platform, as well as Reyee OS network devices,” Claroty researchers Noam Moshe and Tomer Goldschmidt mentioned in a current evaluation. “The vulnerabilities, if exploited, could allow a malicious attacker to execute code on any cloud-enabled device, giving them the ability to control tens of thousands of devices.”

The operational know-how (OT) safety firm, which carried out in-depth analysis of the Web of Issues (IoT) vendor, mentioned it not solely recognized 10 flaws but in addition devised an assault known as “Open Sesame” that can be utilized to hack into an entry level in shut bodily proximity over the cloud and achieve unauthorized entry to its community.

Cybersecurity

Of the 10 vulnerabilities, three of them are rated Vital in severity –

  • CVE-2024-47547 (CVSS rating of 9.4) – Use of a weak password restoration mechanism that leaves the authentication mechanism susceptible to brute pressure assaults
  • CVE-2024-48874 (CVSS rating of 9.8) – A server-side request forgery (SSRF) vulnerability that may very well be exploited to entry inside providers utilized by Ruijie and their inside cloud infrastructure by way of AWS cloud metadata providers
  • CVE-2024-52324 (CVSS rating: 9.8) – Use of an inherently harmful perform that would enable an attacker to ship a malicious MQTT message which may lead to units executing arbitrary working system instructions

Claroty’s analysis additionally discovered that it is simple to interrupt MQTT authentication by merely understanding the system’s serial quantity (CVE-2024-45722, CVSS rating: 7.5), subsequently exploiting the entry to Ruijie’s MQTT dealer in an effort to obtain a full listing of all cloud-connected units’ serial numbers.

“Using the leaked serial numbers, we could generate valid authentication credentials for all cloud-connected devices,” the researchers mentioned. “This meant that we could perform a wide range of denial-of-service attacks, including disconnecting devices by authenticating on their behalf, and even sending fabricated messages and events to the cloud; sending false data to users of these devices.”

The information of the system serial quantity may additional be weaponized to entry all MQTT message queues and problem malicious instructions that will then get executed on all cloud related units (CVE-2024-52324).

That is not all. An attacker who’s bodily adjoining to a Wi-Fi community that makes use of Ruijie entry factors may additionally extract the system’s serial quantity by intercepting the uncooked Wi-Fi beacons, after which leverage the opposite vulnerabilities in MQTT communication to attain distant code execution. The Open Sesame assault has been assigned the CVE identifier CVE-2024-47146 (CVSS rating: 7.5).

Following accountable disclosure, all of the recognized shortcomings have been mounted by the Chinese language firm within the cloud and no consumer motion is required. About 50,000 cloud related units are estimated to have been probably impacted by these bugs.

“This is another example of weaknesses in so-called internet-of-things devices such as wireless access points, routers, and other connected things that have a fairly low barrier to entry on to the device, yet enable much deeper network attacks,” the researchers mentioned.

Cybersecurity

The disclosure comes as safety type PCAutomotive flagged 12 vulnerabilities within the MIB3 infotainment unit utilized in sure Skoda vehicles that malicious actors may chain collectively to attain code execution, observe the vehicles’ location in real-time, file conversations by way of the in-car microphone, take screenshots of the infotainment show, and even exfiltrate contact info.

The failings (from CVE-2023-28902 by way of CVE-2023-29113) allow attackers to “gain code execution on the MIB3 infotainment unit over Bluetooth, elevate privileges to root, bypass secure boot to gain persistent code execution, and control infotainment unit via DNS channel every time the car starts,” PCAutomotive researchers mentioned.

The invention provides to 9 different flaws (from CVE-2023-28895 by way of CVE-2023-28901) recognized within the MIB3 infotainment unit in late 2022 that would enable attackers to set off a denial-of-service, bypass UDS authentication, and procure automobile information — specifically, mileage, current journey length, and common and max.=imum pace of the journey — by understanding solely VIN variety of a automobile.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.

Recent articles

Brazilian Hacker Charged for Extorting $3.2M in Bitcoin After Breaching 300,000 Accounts

Dec 26, 2024Ravie LakshmananCybercrime / Ransomware A Brazilian citizen has...

Prime 8 Plug-and-Play Occasion Planning Templates [FREE]

Whether or not you’re knowledgeable occasion planner, placing collectively...

Vital SQL Injection Vulnerability in Apache Site visitors Management Rated 9.9 CVSS — Patch Now

Dec 25, 2024Ravie LakshmananServer Safety / Vulnerability The Apache Software...