HomeVulnerabilityCISA Provides Actively Exploited Sierra Wi-fi Router Flaw Enabling RCE Attacks

CISA Provides Actively Exploited Sierra Wi-fi Router Flaw Enabling RCE Attacks

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Friday added a high-severity flaw impacting Sierra Wi-fi AirLink ALEOS routers to its Recognized Exploited Vulnerabilities (KEV) catalog, following studies of lively exploitation within the wild.

CVE-2018-4063 (CVSS rating: 8.8/9.9) refers to an unrestricted file add vulnerability that may very well be exploited to attain distant code execution via a malicious HTTP request.

“A specifically crafted HTTP request can add a file, leading to executable code being uploaded, and routable, to the webserver,” the company stated. “An attacker could make an authenticated HTTP request to set off this vulnerability.”

Cybersecurity

Particulars of the six-year-old flaw have been publicly shared by Cisco Talos in April 2019, describing it as an exploitable distant code execution vulnerability within the ACEManager “add.cgi” perform of Sierra Wi-fi AirLink ES450 firmware model 4.9.3. Talos reported the flaw to the Canadian firm in December 2018.

“This vulnerability exists within the file add functionality of templates throughout the AirLink 450,” the corporate stated. “When importing template information, you’ll be able to specify the identify of the file that you’re importing.”

See also  Methods for efficient Board engagement

“There are not any restrictions in place that shield the information which are presently on the gadget, used for regular operation. If a file is uploaded with the identical identify of the file that already exists within the listing, then we inherit the permissions of that file.”

Talos famous that a few of the information that exist within the listing (e.g., “fw_upload_init.cgi” or “fw_status.cgi”) have executable permissions on the gadget, which means an attacker can ship HTTP requests to the “/cgi-bin/add.cgi” endpoint to add a file with the identical identify to attain code execution.

That is compounded by the truth that ACEManager runs as root, thereby inflicting any shell script or executable uploaded to the gadget to additionally run with elevated privileges.

The addition of CVE-2018-4063 to the KEV catalog comes a day after a honeypot evaluation carried out by Forescout over a 90-day interval revealed that industrial routers are essentially the most attacked units in operational expertise (OT) environments, with risk actors making an attempt to ship botnet and cryptocurrency miner malware households like RondoDox, Redtail, and ShadowV2 by exploiting the next flaws –

Cybersecurity

Attacks have additionally been recorded from a beforehand undocumented risk cluster named Chaya_005 that weaponized CVE-2018-4063 in early January 2024 to add an unspecified malicious payload with the identify “fw_upload_init.cgi.” No additional profitable exploitation efforts have been detected since then.

See also  Chinese language Hackers Use GHOSTSPIDER Malware to Hack Telecoms Throughout 12+ International locations

“Chaya_005 seems to be a broader reconnaissance marketing campaign testing a number of vendor vulnerabilities reasonably than specializing in a single one,” Forescout Analysis – Vedere Labs stated, including it is possible the cluster is not a “important risk.”

In gentle of lively exploitation of CVE-2018-4063, Federal Civilian Govt Department (FCEB) businesses are suggested to replace their units to a supported model or discontinue using the product by January 2, 2026, because it has reached end-of-support standing.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular