• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
trend micro home network security flaws could let hackers take

Trend Micro home network security flaws could let hackers take over PCs

You are here: Home / General Cyber Security News / Trend Micro home network security flaws could let hackers take over PCs
May 26, 2021

Shutterstock

Scientists have identified bugs in Development Micro’s House Network Security Station that could allow menace actors mount denial of support (DoS) attacks, escalate privileges, and execute code.

In accordance to researchers at Cisco Talos, three security vulnerabilities in the product are labeled CVE-2021-32457,  CVE-2021-32458, and CVE-2021-32459.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Development Micro’s Home Network Security Station is a system that plugs into a residence router to avoid internet-connected devices from currently being hacked. Unfortunately, the bugs imply that the product itself can be hacked.

The first two flaws, CVE-2021-32457, CVE-2021-32458, guide to privilege escalation. The previous bug exists in the tdts.ko chrdev_ioctl_take care of features of the merchandise. A specially crafted ioctl can lead to increased privileges. An attacker can issue an ioctl to result in this vulnerability, resulting in a kernel stress leading to DoS and leveraging privilege escalation.

The latter flaw is brought on by the absence of enter validation on a user’s ioctl request. The stack-based mostly buffer is smaller than the greatest ioctl ask for duplicate measurement of 0x3FFF and therefore overflows. A consumer can diligently craft input to attain management above a Computer system due to this copy.

The CVE-2021-32459 flaw is a difficult-coded password vulnerability in the SFTP Log Collection Server purpose of Development Micro Inc.’s Property Network Security 6.1.567. A specifically crafted network ask for can direct to arbitrary authentication. An attacker can send out an unauthenticated message to cause this vulnerability.

From there, a hacker could create data files, change permissions on data files and add arbitrary knowledge to an SFTP server.

“The log server is utilized to dump all information and facts that the product collects back to Craze Micro’s infrastructure and can include things like identifiable data of the networks that the details originated from. The username and password are tough-coded in the main binary of the HNS system as diamond:bahV6AtJqZt4K. On the SFTP server, these credentials can be used to build data files, modify permissions on documents and add arbitrary data to the server. This could result in the decline of the logs if documents are overwritten, or facts exfiltration could come about if it is doable to download information,” the advisory warned.

Cisco Talos said it worked with Craze Micro to address these security issues. Development Micro has launched an update for influenced prospects. The scientists didn’t notice active attacks on these flaws.


Some sections of this post are sourced from:
www.itpro.co.uk

Previous Post: «a peek inside the underground ransomware economy A Peek Inside the Underground Ransomware Economy
Next Post: 22 Americans Indicted Over Card-Skimming Scam Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.