Aaron Ardiri
[Valid RSS] RSS/XML feed
198 entries available (show all)

 

Internet of Things (IoT)
   

PLEASE TAKE A MOMENT TO FOLLOW MY NEW VENTURE:
 
RIoT Secure AB
 
ALL SECURITY RELATED TOPICS ON IoT wILL BE POSTED THERE


2016-10-31
>> DIRTY COW - LINUX KERNEL EXPLOIT, RISK FOR IOT?

It is scary to know that bug of this severity and so distributed can go unhandled for so long.

I had a few people ask me about the Dirty Cow exploit and what it means to IoT; so, I figured it was worth a write up. Dirty Cow, aka CVE 2016-5195 is a low level exploit in the Linux kernel utilizes a race condition to break read-only memory mappings - allowing users to gain write access to typically read-only memory mappings on the system. In a matter of seconds; root based privileges could be exposed on the target platform making it a hackers resource.

To see how quickly one could use this exploit to gain root access; watch the following video:

In the traditional Linux world; the risk is low if you simply do not have third party user accounts (other than your own) on your servers. If you do; then keeping your kernel up-to-date is a must - in fact, a fix for the exploit is a measly few lines of code. But the easiest way is to upgrade your kernel and patch the vulnerability. There are a few sample programs that you can run to verify that the exploit is fixed - available on github, ranging from root exploits to modifying read-only files.

So; what about the IoT implications?

I mentioned only a few days ago the increased threat of 0-day exploits when using existing operating systems within your IoT projects. DirtyCow is a Linux specific exploit and there are a tonne of products that utilize the Linux operating system that will be vulnerable to this exploit - such as the very popular Raspberry Pi, BeagleBone and Intel Edison IoT development boards. This doesn't include the millions of CCTV cameras, DVR and routers that utilize Linux.

Raspberry Pi has announced a kernel patch - other hardware manufacturers should follow suit.

A key factor of this exploit does require a user account on the system where the hacker will attempt to escalate privileges; but personally, with open source quite common amongst IoT projects - the risk may be more cynical. It wouldn't take much for someone to inject some code into open source projects that goes unnoticed - maintainers of repositories need to watch commits more closely.

This doesn't even cover the more serious threat from the largest mobile operating system available on the market - with over 87.6% market share in 2016-Q2, the popular mobile platform Android. Innocent users could have their mobile phones exploited with malicious code injected into mobile applications that can be distributed by Google Play or side-loaded - the threat is real - the exploit started with version 2.6.22, Android 1.0 started on version 2.6.25 - nasty.

Time for mobile phone manufactures (Samsung, Sony, LG et al) to roll out kernel updates ASAP.


 

advertisement (self plug):
need assistance in an IoT project? contact us for a free consultation.

 



Movie recommendation - I.T. feat Pierce Brosnan
 
Digging up the archives - PalmOS Liberty trojan horse

DISCLAIMER:
All content provided on this blog is for informational purposes only.
All comments are generated by users and moderated for inappropriateness periodically.
The owner will not be liable for any losses, injuries, or damages from the display or use of this information.