• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Critical Bugs Found in Popular Realtek Wi-Fi Module for Embedded Devices

You are here: Home / General Cyber Security News / Critical Bugs Found in Popular Realtek Wi-Fi Module for Embedded Devices

Main vulnerabilities have been identified in the Realtek RTL8195A Wi-Fi module that could have been exploited to acquire root obtain and get finish control of a device’s wireless communications.

The 6 flaws had been noted by researchers from Israeli IoT security agency Vdoo.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Acronis True Image 2021

Protect and backup your data using Acronis True Image. Acronis is made in Germany and is a leading brand in IT back up and secirity for years. Acronis True Image take secure and enxrypted backups from your Wdindows and macOS. With Acronis True image you will never be worried about Ransomware attacks and virus infections.

Get Acronis with 50% discount from our partner: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The Realtek RTL8195A module is a standalone, lower-electric power-intake Wi-Fi components module specific at embedded devices employed in a number of industries such as agriculture, clever residence, healthcare, gaming, and automotive sectors.

It also will make use of an “Ameba” API, letting developers to connect with the system via Wi-Fi, HTTP, and MQTT, a lightweight messaging protocol for modest sensors and cellular products.

password auditor

Though the issues uncovered by Vdoo have been confirmed only on RTL8195A, the researchers said they extend to other modules as very well, such as RTL8711AM, RTL8711AF, and RTL8710AF.

The flaws problem a mix of stack overflow, and out-of-bounds reads that stem from the Wi-Fi module’s WPA2 four-way handshake mechanism for the duration of authentication.

Chief among the them is a buffer overflow vulnerability (CVE-2020-9395) that permits an attacker in the proximity of an RTL8195 module to entirely just take above the module, with out acquiring to know the Wi-Fi network password (or pre-shared important) and regardless of irrespective of whether the module is performing as a Wi-Fi accessibility position (AP) or client.

Two other flaws can be abused to phase a denial of support, even though another established of three weaknesses, including CVE-2020-25854, could permit exploitation of Wi-Fi customer devices and execute arbitrary code.

Thus in one particular of the opportunity attack eventualities, an adversary with prior understanding of the passphrase for the WPA2 Wi-Fi network that the victim unit is linked to can develop a destructive AP by sniffing the network’s SSID and Pairwise Transit Vital (PTK) — which is utilized to encrypt site visitors involving a customer and the AP — and drive the concentrate on to link to the new AP and operate destructive code.

Realtek, in reaction, has unveiled Ameba Arduino 2..8 with patches for all the six vulnerabilities discovered by Vdoo. It truly is value noting that firmware versions introduced immediately after April 21, 2020, already come with the required protections to thwart these types of takeover attacks.

“An issue was found on Realtek RTL8195AM, RTL8711AM, RTL8711AF, and RTL8710AF gadgets right before 2..6,” the company stated in a security bulletin. “A stack-centered buffer overflow exists in the shopper code that requires care of WPA2’s 4-way-handshake by way of a malformed EAPOL-Critical packet with a lengthy keydata buffer.”

Located this write-up attention-grabbing? Observe THN on Fb, Twitter  and LinkedIn to browse additional exceptional articles we post.


Some pieces of this write-up are sourced from:
thehackernews.com

Previous Post: «Teamtnt Launches Cryptojacking Operation On Kubnernetes Clusters TeamTNT launches cryptojacking operation on Kubnernetes clusters

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Critical Bugs Found in Popular Realtek Wi-Fi Module for Embedded Devices
  • TeamTNT launches cryptojacking operation on Kubnernetes clusters
  • SonicWall issues firmware patch after attackers exploited critical bugs
  • SOC teams spend nearly a quarter of their day handling suspicious emails
  • Emotet’s Takedown: Have We Seen the Last of the Malware?
  • Second SolarWinds Attack Group Breaks into USDA Payroll — Report
  • New Malware Hijacks Kubernetes Clusters to Mine Monero
  • Fertility App Sued Over Non-Consensual Data Sharing
  • Execs fear business setbacks from failure to keep up with ‘digital born’ competitors
  • Prison for International Credit Card Fraud Kingpin

Copyright © TheCyberSecurity.News, All Rights Reserved.