Critical OpenWrt Vulnerability Allowed Potential Malicious Firmware Distribution via Attended Sysupgrade

by | Dec 10, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A critical vulnerability (CVE-2024-54143) in OpenWrt’s Attended Sysupgrade feature, used to create custom firmware images, could have been exploited to distribute malicious firmware packages.

What Is OpenWrt?

OpenWrt is a popular, highly customizable Linux-based operating system for embedded devices, especially routers and IoT hardware. It supports devices from major brands like ASUS, D-Link, Belkin, and many others, offering advanced features and greater flexibility compared to stock firmware.

The Vulnerability

Flatt Security researcher RyotaK discovered the issue during a routine home lab upgrade. The flaw, rated critical with a CVSS v4 score of 9.3, was found in OpenWrt’s Attended Sysupgrade (ASU) service. This feature simplifies upgrading devices by preserving packages and settings during firmware updates.

Two Main Issues Identified:

  1. Command Injection via Package Names:

    • The sysupgrade.openwrt.org service processes inputs through commands in a containerized environment.
    • Improper handling of the make command allowed arbitrary command injection via manipulated package names.
  2. Hash Truncation Vulnerability:

    • The service uses a 12-character truncated SHA-256 hash (48 bits) for caching build artifacts.
    • This makes brute-forcing collisions feasible, enabling attackers to reuse cache keys from legitimate firmware builds.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Exploit Demonstration

By combining these flaws, RyotaK demonstrated that it was possible to modify legitimate firmware artifacts and serve malicious firmware. Using Hashcat on an RTX 4090 GPU, the researcher brute-forced hash collisions to overwrite firmware builds.

The result? Malicious firmware could be distributed to unsuspecting users through poisoned images, compromising their devices.

Python script used for overwriting legitimate firmware buildsPython script used for overwriting legitimate firmware builds
Source: Flatt Security

OpenWrt’s Response

OpenWrt’s team acted swiftly upon receiving the private report:

  • Service Taken Down: The sysupgrade.openwrt.org service was disabled immediately.
  • Rapid Fix and Recovery: The vulnerability was patched, and the service was restored within 3 hours on December 4, 2024.

The team confirmed no evidence of malicious activity during the 7-day log window they were able to review. However, they advised users to regenerate and reinstall firmware images to eliminate any potential risk




Recommendations for Users

  1. Upgrade Firmware Immediately:

    • Perform an in-place upgrade with the same firmware version to ensure a clean, safe image.
  2. Self-Hosted ASU Instances:

    • If running a public ASU service, update it immediately to include the latest fixes.
  3. Verify Downloads:

    • While there is no evidence of compromised images from downloads.openwrt.org, users should remain cautious and re-download firmware if necessary.
  4. Stay Updated:

    • Follow OpenWrt announcements for further guidance and updates.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This