Security Alerts blog

“Fly Trap” Cyber Attackers Target Home Routers

Three days after the revelation, cyber attackers are commandeering home routers from 20 vendors along with ISPs.

The security blemish, followed as CVE-2021-20090, was revealed last week by specialists at Tenable. It influences gadgets from 20 unique sellers and ISPs (ADB, Arcadyan, ASMAX, ASUS, Beeline, British Telecom, Buffalo, Deutsche Telekom, HughesNet, KPN, O2, Orange, Skinny, SparkNZ, Telecom [Argentina], TelMex, Telstra, Telus, Verizon and Vodafone), who all use the same firmware by Arcadyan. Overall, this could cause millions of devices to be vulnerable.

In a proof of concept exercise, Tenable discovered that it’s feasible to adjust a device’s configuration to enable Telnet on a vulnerable router; and reach the starting point of the gadget.

The impact

According to Tenable’s advisory on the 3rd of August, “the weakness exists because of a rundown of folders which fall under a ‘bypass list’ for authentication.” For the vast majority of the devices listed, that implies that the weakness can be set off in different ways. A device wherein http://<ip>/index.htm requires confirmation, the attacker could then access index.htm using the following paths:

  • http://<ip>/images/..%2findex.htm
  • http://<ip>/js/..%2findex.htm
  • http://<ip>/css/..%2findex.htm

The warning proceeds to state, “To have the pages load properly, one will need to use proxy match/replace settings to ensure any resources loaded which require authentication also leverage the path traversal.”

The remediation

Users that have these routers are advised to seek updates and mitigation information from their various vendors.

Source: Threat Post

Risk Crew

Share
Published by
Risk Crew

Recent Posts

ISO 42001: Key Insights You Need to Know

Introducing ISO 42001 – the world’s first international management system standard focused specifically on AI.…

3 months ago

ISO 27001 Requirements | Your Roadmap to Compliance

Data breaches and cyberattacks have become daily concerns for information security professionals and business leaders.…

3 months ago

How to Get Ready for a Penetration Test

It is an undeniable fact that all applications and infrastructures are essentially in need of…

5 months ago