Warning of Critical Vulnerability Affecting Realtek Wi-Fi Modules
Researchers from Israeli IoT security company Vdoo have just released a report about a series of serious security vulnerabilities that exist in the Realtek RTL8170C WiFi module. Through these vulnerabilities, malicious actors can completely gain higher privileges on the target device and compromise data transmitted over wireless internet connection.
" These vulnerabilities, if successfully exploited, will result in complete control over the WiFi module and potential root access on the operating system (such as Linux or Android) of an embedded device using the module. this -dun "Vdoo team said in a statement.
The Realtek RTL8710C is a Wi-Fi SoC that serves as the core of Ameba, a programmable platform that is compatible with Arduino and equipped with peripheral interfaces that support the development of a wide range of IoT applications used in industrial applications. important sectors such as agriculture, automotive, energy, healthcare, industry, security and smart home.
According to the analysis results of experts, this set of vulnerabilities affects all embedded and IoT devices that use Realtek RTL8710C to connect to WiFi networks. However, to exploit the vulnerability, an attacker would have to be on the same WiFi network as the target device, or have a pre-shared key (PSK) - a type of password used for authentication. wireless clients on the local network.
WiFi module can be hacked without router password
The discovery of this critical cluster of vulnerabilities can be considered the result of an investigation conducted earlier in February, which also found similar problems in the Realtek RTL8195A WiFi module. Chief among them is a buffer overflow vulnerability (CVE-2020-9395) that allows an attacker near Realtek RTL8195 to completely take control of this module without having to hold the WiFi network password.
Similarly, the 4-way Handshake WPA2 mechanism of the RTL8170C WiFi module can also be abused by two stack-based buffer overflow vulnerabilities (CVE-2020-27301 and CVE-2020-27302, CVSS score: 8.0 ). In it, the attacker's requirement is to have PSK knowledge to remotely execute code on WPA2 clients using this WiFi module.
Returning to the vulnerabilities related to the Realtek RTL8710C module, Vdoo researchers have released a proof-of-concept (PoC) document describing a real-life exploit scenario. In it, the attacker will disguise as a legitimate access point and send a maliciously encrypted Group Temporal Key (GTK) to the target via the WPA2 protocol.
Currently, there have been no cases of successful exploitation of the above vulnerabilities recorded in practice. However, users are recommended to update the Realtek RTL8710C firmware to the latest version to limit risks. At the same time, "strong, private WPA2 passphrases" should also be deployed to limit the risk in cases where the device's firmware cannot be updated.
You should read it
- How to fix the Realtek HD Audio Manager missing error in Windows 10
- How to hack pass wifi with WiFi Map everywhere
- How to hack WiFi passwords with holes on WPA / WPA2
- How to fix a computer error without Realtek HD Audio Manager
- The Module in AngularJS
- Fix Install Realtek HD Audio Driver Failure, Error OxC0000374 on Windows 10
- Utility Module in Node.js
- Can't open Realtek HD Audio Manager Win 10 + 11, quick fix
May be interested
- How to update and reinstall Realtek HD Audio Managerrealtek hd audio manager is one of the most popular and useful software that windows users have on pc. usually, it is installed on a pc, but users cannot even find it using the windows search engine.
- Hundreds of HP printer models contain vulnerabilities that allow remote code execution attackshp has issued security alerts for three critical vulnerabilities affecting hundreds of laserjet pro, pagewide pro, officejet, enterprise, large format, and deskjet printer models.
- Warning of dangerous Spring4Shell vulnerability, there are signs of scanning and exploitingspring has just released an urgent update to patch the spring4shell remote code execution zero-day vulnerability. information about this vulnerability was leaked on the internet before the patch was released.
- New privilege escalation vulnerability called 'Dirty Pipe' is threatening all Linux distrosrecently, security researcher max kellermann shared about a security flaw called 'dirty pipe'. it affects linux kernel 5.8 and above and even android devices.
- Detecting an 8-year-old security flaw, affecting 150 HP printer modelsresearchers have discovered several security vulnerabilities affecting at least 150 models of hp multifunction printers (print, scan, fax).
- Warning: Vulnerability in Windows' HTTP Protocol Stack attacks remote code execution, no authentication requiredrecently, the ncsc cybersecurity monitoring center recorded an exploit code for a critical security vulnerability cve-2022-21907 in windows' http protocol stack.
- New zero-day vulnerability warning in Windows Search, Windows protocol nightmare getting worsea new windows search vulnerability can be exploited to automatically open a search window containing remotely hosted malicious executable files just by launching a word document.
- How to fix the Realtek HD Audio Manager missing error in Windows 10many users have reported the realtek hd audio manager missing error in windows 10. in this article, readers will learn how to fix realtek hd audio manager missing problem in windows 10.
- Module in Pythonin this python lesson we will know how to create and import a module in python. we will learn a few ways to import, using custom modules as well as python's built-in modules, please watch.
- Apple releases iOS 14.4.2, iOS 12.5.2, and watchOS 7.3.3 updates that patch the critical zero-day vulnerabilityapple just released a series of security updates aimed at addressing a relatively serious zero-day vulnerability on ios.