Botnet's Huawei Router Exploit Code Now Public

Exploit code used by the Satori botnet to compromise Huawei routers[1] via a zero-day vulnerability became public last week, researchers have discovered.

The exploit has been used in attacks involving the Mirai[2] variant Satori to target Huawei vulnerability CVE-2017-17215, which was unpatched at the time the first assaults started. The vulnerability was found in Huawei HG532 devices in November. Shortly after, Huawei published an advisory on how users can circumvent or prevent the exploit.

Discovered on Pastebin this Christmas, the code could fuel a spike in attempts to exploit the vulnerability.

In fact, it has been already used by the destructive BrickerBot malware[3] to target Internet of Things (IoT) devices, NewSky Security says[4].

In early December, the actor behind BrickerBot dumped some of the code online and announced[5] plans to retire his project. The released code included some of the malware's attack modules, including one that targeted said Huawei flaw, researchers have discovered.

"While analyzing this code, we also uncovered the usage of CVE-2017-17215, implying that this code has been in blackhats' hands for a while," NewSky reveals.

While analyzing the Satori and BrickerBot code, the security researchers noticed that the same attack vector (code injection) is present in both, which led to the conclusion that both malware developers "had copied the exploit source code from the same source."

The security researchers also point out that the SOAP protocol (Simple Object Access Protocol) has been abused before in attacks involving IoT devices. Several Mirai variants observed last year were using two other SOAP bugs (CVE-2014-8361 and TR-64).

One iteration was using them together, to increase the chances of a successful attack.

"IoT attacks are becoming modular day by day.

When an IoT exploit becomes freely available, it hardly takes much time for threat actors to up their arsenal and implement the exploit as one of the attack vectors in their botnet code," NewSky concludes.

Related: Improved IoT Security Starts with Liability for Companies, Not Just Legislation[6]

Related: Mirai Variant "Satori" Targets Huawei Routers[7]

References

  1. ^ to compromise Huawei routers (www.securityweek.com)
  2. ^ Mirai (www.securityweek.com)
  3. ^ BrickerBot malware (www.securityweek.com)
  4. ^ says (blog.newskysecurity.com)
  5. ^ announced (www.bleepingcomputer.com)
  6. ^ Improved IoT Security Starts with Liability for Companies, Not Just Legislation (www.securityweek.com)
  7. ^ Mirai Variant "Satori" Targets Huawei Routers (www.securityweek.com)

Leave a Reply

Your email address will not be published. Required fields are marked *