FreeRTOS Multiple Remote Code Execution Vulnerabilities Threat Alert

FreeRTOS Multiple Remote Code Execution Vulnerabilities Threat Alert

outubro 25, 2018 | Adeline Zhang

Overview

Recently, researchers from Zimperium disclosed 13 critical vulnerabilities in FreeRTOS, including four remote code execution vulnerabilities.

These vulnerabilities are listed as follows:

CVE ID Vulnerability Type
CVE-2018-16522 Remote Code Execution
CVE-2018-16525 Remote Code Execution
CVE-2018-16526 Remote Code Eexecution
CVE-2018-16528 Remote Code Execution
CVE-2018-16523 Denial of Service
CVE-2018-16524 Information Leak
CVE-2018-16527   Information Leak
CVE-2018-16599 Information Leak
CVE-2018-16600 Information Leak
CVE-2018-16601 Information Leak
CVE-2018-16602 Information Leak
CVE-2018-16603 Information Leak
CVE-2018-16598 Other

Reference link:

https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/

Affected Versions

  • FreeRTOS up to V10.0.1 (with FreeRTOS+TCP)
  • AWS FreeRTOS up to V1.3.1
  • WHIS OpenRTOS and SafeRTOS (With WHIS Connect middleware TCP/IP components)

Solution

Currently, some vendors, including Amazon, have released patches to fix AWS FreeRTOS (AWS FreeRTOS 1.3.2) and WHIS OpenRTOS and SafeRTOS.

For details, please visit the following link:

https://github.com/aws/amazon-freertos/blob/master/CHANGELOG.md

As this is an open-source project, researches have decided to wait for 30 days before publishing technical details about the preceding vulnerabilities, to allow enough time for affected vendors to patch the vulnerabilities.

Reference link:

https://blog.zimperium.com/freertos-tcpip-stack-vulnerabilities-put-wide-range-devices-risk-compromise-smart-homes-critical-infrastructure-systems/

Statement

This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.

About NSFOCUS

NSFOCUS IB is a wholly owned subsidiary of NSFOCUS, an enterprise application and network security provider, with operations in the Americas, Europe, the Middle East, Southeast Asia and Japan. NSFOCUS IB has a proven track record of combatting the increasingly complex cyber threat landscape through the construction and implementation of multi-layered defense systems. The company’s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide unified, multi-layer protection from advanced cyber threats.

For more information about NSFOCUS, please visit:

Home

NSFOCUS, NSFOCUS IB, and NSFOCUS, INC. are trademarks or registered trademarks of NSFOCUS, Inc. All other names and trademarks are property of their respective firms.