Warning of Critical Vulnerability Affecting Realtek Wi-Fi Modules
Researchers from Israeli IoT security company Vdoo have just released a report about a series of serious security vulnerabilities that exist in the Realtek RTL8170C WiFi module. Through these vulnerabilities, malicious actors can completely gain higher privileges on the target device and compromise data transmitted over wireless internet connection.
" These vulnerabilities, if successfully exploited, will result in complete control over the WiFi module and potential root access on the operating system (such as Linux or Android) of an embedded device using the module. this -dun "Vdoo team said in a statement.
The Realtek RTL8710C is a Wi-Fi SoC that serves as the core of Ameba, a programmable platform that is compatible with Arduino and equipped with peripheral interfaces that support the development of a wide range of IoT applications used in industrial applications. important sectors such as agriculture, automotive, energy, healthcare, industry, security and smart home.
According to the analysis results of experts, this set of vulnerabilities affects all embedded and IoT devices that use Realtek RTL8710C to connect to WiFi networks. However, to exploit the vulnerability, an attacker would have to be on the same WiFi network as the target device, or have a pre-shared key (PSK) - a type of password used for authentication. wireless clients on the local network.
WiFi module can be hacked without router password
The discovery of this critical cluster of vulnerabilities can be considered the result of an investigation conducted earlier in February, which also found similar problems in the Realtek RTL8195A WiFi module. Chief among them is a buffer overflow vulnerability (CVE-2020-9395) that allows an attacker near Realtek RTL8195 to completely take control of this module without having to hold the WiFi network password.
Similarly, the 4-way Handshake WPA2 mechanism of the RTL8170C WiFi module can also be abused by two stack-based buffer overflow vulnerabilities (CVE-2020-27301 and CVE-2020-27302, CVSS score: 8.0 ). In it, the attacker's requirement is to have PSK knowledge to remotely execute code on WPA2 clients using this WiFi module.
Returning to the vulnerabilities related to the Realtek RTL8710C module, Vdoo researchers have released a proof-of-concept (PoC) document describing a real-life exploit scenario. In it, the attacker will disguise as a legitimate access point and send a maliciously encrypted Group Temporal Key (GTK) to the target via the WPA2 protocol.
Currently, there have been no cases of successful exploitation of the above vulnerabilities recorded in practice. However, users are recommended to update the Realtek RTL8710C firmware to the latest version to limit risks. At the same time, "strong, private WPA2 passphrases" should also be deployed to limit the risk in cases where the device's firmware cannot be updated.
You should read it
- How to update and reinstall Realtek HD Audio Manager
- Module in Node.js
- How to fix the Realtek HD Audio Manager missing error in Windows 10
- How to hack pass wifi with WiFi Map everywhere
- How to hack WiFi passwords with holes on WPA / WPA2
- How to fix a computer error without Realtek HD Audio Manager
- The Module in AngularJS
- Fix Install Realtek HD Audio Driver Failure, Error OxC0000374 on Windows 10
- Utility Module in Node.js
- Can't open Realtek HD Audio Manager Win 10 + 11, quick fix
- How to turn off WiFi of Raspberry Pi
- How to hack Wifi passwords using Wifiphisher
Maybe you are interested
Should I buy a tablet with 4G LTE/5G connectivity or just WiFi?
How to log in to Wifi Modem Router to change Wifi name and password
Fix computer error not finding Wifi network successfully
'Silent' Town: No Wifi, No Mobile Signals for Over 60 Years
How to Use WiFi Analyzer to Boost Your Wi-Fi Connection
7 must-have features on a WiFi router