• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
trend micro home network security flaws could let hackers take

Trend Micro home network security flaws could let hackers take over PCs

You are here: Home / General Cyber Security News / Trend Micro home network security flaws could let hackers take over PCs
May 26, 2021

Shutterstock

Scientists have identified bugs in Development Micro’s House Network Security Station that could allow menace actors mount denial of support (DoS) attacks, escalate privileges, and execute code.

In accordance to researchers at Cisco Talos, three security vulnerabilities in the product are labeled CVE-2021-32457,  CVE-2021-32458, and CVE-2021-32459.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Development Micro’s Home Network Security Station is a system that plugs into a residence router to avoid internet-connected devices from currently being hacked. Unfortunately, the bugs imply that the product itself can be hacked.

The first two flaws, CVE-2021-32457, CVE-2021-32458, guide to privilege escalation. The previous bug exists in the tdts.ko chrdev_ioctl_take care of features of the merchandise. A specially crafted ioctl can lead to increased privileges. An attacker can issue an ioctl to result in this vulnerability, resulting in a kernel stress leading to DoS and leveraging privilege escalation.

The latter flaw is brought on by the absence of enter validation on a user’s ioctl request. The stack-based mostly buffer is smaller than the greatest ioctl ask for duplicate measurement of 0x3FFF and therefore overflows. A consumer can diligently craft input to attain management above a Computer system due to this copy.

The CVE-2021-32459 flaw is a difficult-coded password vulnerability in the SFTP Log Collection Server purpose of Development Micro Inc.’s Property Network Security 6.1.567. A specifically crafted network ask for can direct to arbitrary authentication. An attacker can send out an unauthenticated message to cause this vulnerability.

From there, a hacker could create data files, change permissions on data files and add arbitrary knowledge to an SFTP server.

“The log server is utilized to dump all information and facts that the product collects back to Craze Micro’s infrastructure and can include things like identifiable data of the networks that the details originated from. The username and password are tough-coded in the main binary of the HNS system as diamond:bahV6AtJqZt4K. On the SFTP server, these credentials can be used to build data files, modify permissions on documents and add arbitrary data to the server. This could result in the decline of the logs if documents are overwritten, or facts exfiltration could come about if it is doable to download information,” the advisory warned.

Cisco Talos said it worked with Craze Micro to address these security issues. Development Micro has launched an update for influenced prospects. The scientists didn’t notice active attacks on these flaws.


Some sections of this post are sourced from:
www.itpro.co.uk

Previous Post: «a peek inside the underground ransomware economy A Peek Inside the Underground Ransomware Economy
Next Post: 22 Americans Indicted Over Card-Skimming Scam Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.