Unser Weblog
Aktuelle Beiträge aus unserem Weblog
Security Advisory: Clock Fault Injection on Mocor OS – Password Bypass
Introduction
This security advisory addresses a vulnerability discovered during a recent forensics engagement. Our investigation together with ONEKEY revealed that the Mocor OS, running on UNISOC SC6531E devices, is susceptible to a clock fault injection attack, which poses a significant threat to user data security and privacy. Through this attack vector, an unauthorized user with physical to a device access can bypass the device’s user lock, gaining unrestricted access to the main screen and compromising the integrity of the system. Notably, this vulnerability arises from a flaw in the soft reset routine performed by the OS kernel, which lacks proper permission checks for user passwords, making feature/burner phones vulnerable to exploitation.
Weiterlesen...BCM – Business Continuity Management & Resilienz: Zwei Bausteine vitaler Organisationen
In Zeiten von Naturkatastrophen, Cyberangriffen und anderen Krisen ist es für Unternehmen unerlässlich, sich auf diese Bedrohungen bestmöglich vorzubereiten.
Business Continuity Management (BCM) und Resilienz sind zwei wesentliche Aspekte, um Unternehmen und Organisationen vor unvorhersehbaren Ereignissen, dies kann alles von Naturkatastrophen bis hin zu Cyberangriffen, umfassen, zu schützen und im Ernstfall das Unternehmen schnell wieder handlungsfähig zu machen. Es geht dabei nicht nur darum, eine Krise zu überstehen, sondern vor allem auch gestärkt daraus hervorzugehen.
Weiterlesen...CERTAINITY European Cyber Resilience Act Preparedness Survey
In cooperation with the University of Innsbruck CERTAINITY is conducting an online survey to investigate how well-prepared companies are for the introduction of the European Cyber Resilience Act.
Our target audience are organizations and stakeholders being responsible for product development and ongoing maintenance. If your organization develops, sells or imports networked hardware or software products within the EU, you are a perfect candidate to participate in our study.
We highly appreciate it, if you take 10 to 15 minutes to share your expertise and participate in our survey. We will ask questions concerning your organization, the current state of your secure development and product vulnerability management processes as well as your current documentation practices.
Weiterlesen...No plan survives the first contact with the enemy
The importance of exercises in IT security
While the saying “No plan survives first contact with the enemy” is certainly true, this fact rarely leads to resignation and surrender. Rather, attempts are made to keep the delta between plan and reality as small as possible, even after fine contact, through constant practice and training. Transferred to the preparation for IT security incidents (incident readiness), this means regularly and thoroughly practicing emergency plans, backup-restore processes, and the like. One way to do this is by conducting IT security exercises.
Weiterlesen...Security Advisory: Unauthenticated Remote Command Execution in Multiple WAGO Products
May 17, 2023
Introduction
As we already demonstrated through our recent advisories (Asus M25 NAS, Phoenix Contact, NetModule , Festo) ONEKEY's "zero day identification" module is quite versatile when it comes to finding bugs in PHP, Lua, or Python code we find in firmware uploaded to ONEKEY's platform. However, we recently discovered that we were missing an interesting source for PHP taint analysis: PHP wrappers.
PHP comes with many built-in wrappers for various URL-style protocols for use with the filesystem functions such as fopen(), copy(), file_exists() and filesize(). They are sometimes used to read the content of HTTP requests or command line arguments by using php://input, php://stdin, or php://fd/0 (ok the last one is a bit far-fetched and came up when we discussed potential sources for the taint analysis, but you get the point :) ).
Weiterlesen...Security Advisory: Multiple Vulnerabilities in Phoenix Contact Routers
Introduction
This is the fourth security advisory we release together with ONEKEY that is related to the introduction of a “zero-day identification” module that performs static code analysis on proprietary applications found within firmware uploaded to ONEKEY's platform. You can find the first three here: Asus M25 NAS Vulnerability, Multiple Vulnerabilities in NetModule Routers, and Unauthenticated Configuration Export in Multiple WAGO Products.
Phoenix Contact is a manufacturer of industrial grade routers. The vulnerabilities identified within the web management interface allow authenticated users to execute arbitrary commands with elevated privileges or to access any file on the system.
Weiterlesen...NIS2 - der Treibstoff für die ISO 27001
Cyberangriffe gehören zu der weltweit am schnellsten wachsenden Form an Kriminalität. Ein guter Indikator für den aktuellen Zustand ist die Tatsache, dass laut Medienberichten die Versicherbarkeit von Unternehmen gegen Cyberangriffen deutlich schwerer geworden ist. Die Versicherer schrauben den erforderlichen Reifegrad an Sicherheit hoch. Und genau das wird die Ablöse der derzeit gängigen Self-Assessments durch qualifizierte Audits mit der Hinterlegung zwingend erforderlicher Evidenzen mit sich bringen.
Geschäftsführung ist in der Pflicht
Durch die Richtlinie (EU) 2022/2555 erfolgt eine wesentliche Erweiterung der betroffenen Unternehmen und deren Pflichten. Ab 2024 kann davon ausgegangen werden, dass in Österreich ca. 3.000 Unternehmen, unterteilt in 16 Sektoren, ab 50 Mitarbeitern und 10 Mio. EUR Umsatz, nachweislich Cybersecurity Maßnahmen umsetzen müssen. Die nationale Gesetzgebung wird die Überprüfung der Einhaltung der Mindeststandards übernehmen und in weiterer Folge Geschäftsführer von Betreibern kritischer Infrastrukturen in die Pflicht nehmen.
Weiterlesen...Security Advisory: Multiple Vulnerabilities in NetModule Routers
Introduction
This is the third security advisory we release in cooperation with ONEKEY that is related to the introduction of a “zero-day identification” module that performs static code analysis on proprietary applications found within firmware uploaded to ONEKEY’s platform.
NetModule is an Original Equipment Manufacturer of industrial grade routers. The vulnerabilities identified within the web management interface allow authenticated users to execute arbitrary commands with elevated privileges or to access any file on the system.
Weiterlesen...Cyber-Incident do’s and don’ts
Als Cyber-Incident-Response-Anbieter haben wir bei CERTAINITY mit Ransomware- und anderen Cyberattacken zu tun, die verheerende Auswirkungen auf die betroffene Organisation haben. In diesem Blogbeitrag erläutern wir die wichtigsten Do’s und Don’ts im Umgang mit Cyber-Vorfällen. Die Reaktion auf Cybervorfälle bezieht sich auf die Maßnahmen, die ein Unternehmen ergreift, um die Auswirkungen eines Cyberangriffs oder einer Datenverletzung zu bewältigen und einzudämmen. Eine wirksame Reaktion auf Cybervorfälle ist entscheidend für die Minimierung der durch einen Cybervorfall verursachten Schäden und die schnellstmögliche Wiederherstellung des normalen Betriebs.
Weiterlesen...Security Advisory: Unauthenticated Configuration Export in Multiple WAGO Products
As shown in our previous security advisory for the Asus M25 NAS from our research cooperation with ONEKEY, we recently introduced a “zero-day identification” module that performs static code analysis on proprietary applications found within firmware uploaded to ONEKEY’s platform.
This module reported two potential issues within a WAGO Series PFC100 configuration API: a path traversal and a command injection vulnerability. The command injection turned out to be a false positive (we strengthened our analysis capabilities since then) but it got us to investigate a specific PHP file where we identified that the authentication and authorization code blocks were commented.
Weiterlesen...