Vital Flaw in Microchip ASF Exposes IoT Units to Distant Code Execution Threat

0
19
Vital Flaw in Microchip ASF Exposes IoT Units to Distant Code Execution Threat


Sep 23, 2024Ravie LakshmananIoT Safety / Vulnerability

Vital Flaw in Microchip ASF Exposes IoT Units to Distant Code Execution Threat

A vital safety flaw has been disclosed within the Microchip Superior Software program Framework (ASF) that, if efficiently exploited, might result in distant code execution.

The vulnerability, tracked as CVE-2024-7490, carries a CVSS rating of 9.5 out of a most of 10.0. It has been described as a stack-based overflow vulnerability in ASF’s implementation of the tinydhcp server stemming from a scarcity of enough enter validation.

“There exists a vulnerability in all publicly out there examples of the ASF codebase that enables for a specifically crafted DHCP request to trigger a stack-based overflow that might result in distant code execution,” CERT Coordination Middle (CERT/CC) stated in an advisory.

Cybersecurity

Provided that the software program is not supported and is rooted in IoT-centric code, CERT/CC has warned that the vulnerability is “more likely to floor in lots of locations within the wild.”

The problem impacts ASF 3.52.0.2574 and all prior variations of the software program, with the company additionally noting that a number of forks of the tinydhcp software program are seemingly prone to the flaw as nicely.

There are at the moment no fixes or mitigations to handle CVE-2024-7490, barring changing the tinydhcp service with one other one that doesn’t have the identical situation.

The event comes as SonicWall Seize Labs detailed a extreme zero-click vulnerability affecting MediaTek Wi-Fi chipsets (CVE-2024-20017, CVSS 9.8) that might open the door to distant code execution with out requiring any consumer interplay because of an out-of-bounds write situation.

“The affected variations embody MediaTek SDK variations 7.4.0.1 and earlier, in addition to OpenWrt 19.07 and 21.02,” the corporate stated. “This interprets to a big number of susceptible gadgets, together with routers and smartphones.”

Cybersecurity

“The vulnerability is a buffer overflow because of a size worth taken immediately from attacker-controlled packet knowledge with out bounds checking and positioned right into a reminiscence copy. This buffer overflow creates an out-of-bounds write.”

A patch for the vulnerability was launched by MediaTek in March 2024, though the chance of exploitation has elevated with the public availability of a proof-of-concept (PoC) exploit as of August 30, 2024.

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.



LEAVE A REPLY

Please enter your comment!
Please enter your name here