vulnerabilidades perigosas foram recentemente descobertas em dispositivos de rádio Telestar Digital GmbH IdC. As falhas poderiam permitir que atacantes remotos para seqüestrar sistemas vulneráveis.
As vulnerabilidades foram descobertos pelo Laboratório vulnerabilidade. Alguns deles já estão atribuídos números CVE – CVE-2019-13473 and CVE-2019-13474. The vulnerable devices are web radios “Dabman & Imperial” (series i & d) which are distributed in Germany by Telestar Digital GmbH. The devices utilize Bluetooth and Internet connectivity, and are based on BusyBox Linux Debian.
How were the vulnerabilities discovered?
Vulnerability Laboratory came across an anomaly on a private server which was stemming from web radio terminals of Telestar devices. As explained by security researcher Benjamin Kunz, during the investigation they noticed an undocumented Telnet service on the standard port 23 on these end devices during a port scan.
Since port forwarding was activated for all ports on this network, it could be addressed from the outside. Telnet services are less used today, because content is transmitted unencrypted and there are better alternatives today. mesmo assim, the protocol on network level and in end devices is still a bigger topic than originally thought, explica a pesquisadora.
The researchers were able to connect and brute-force one of the radios. The attack granted them root access with full privileges. Other attacks that can be performed against the devices include changing device names, forcing a play stream, saving audio files as messages, and transmitting audio as commands locally and remotely.
Mais que 1 million devices may be at risk of attacks.