Analysis of the Attack Surface of Ubus Inter-Process Communication Mechanism in OpenWRT

Analysis of the Attack Surface of Ubus Inter-Process Communication Mechanism in OpenWRT

01 Introduction Ubus is the inter-process communication mechanism in OpenWRT, which simplifies the implementation of inter-process communication. The foundation of ubus is the UNIX Socket, which is a local socket that is more efficient and reliable compared to traditional network communication sockets. 1.1 Model Architecture UNIX Socket adopts a C/S model architecture, divided into server … Read more

Urgent Warning: Multiple Critical Vulnerabilities in RTOS VxWorks

Urgent Warning: Multiple Critical Vulnerabilities in RTOS VxWorks

0x00 Background Researchers at Armis have discovered 11 zero-day vulnerabilities in VxWorks, the most popular real-time operating system (RTOS), used by over 2 billion devices, including critical mission devices in industrial, medical, and enterprise settings. These vulnerabilities, referred to as ‘URGENT / 11′, exist in IPnet, VxWorks’ TCP/IP stack, affecting versions released over the past … Read more

Your Smart Speaker Might Be ‘Listening’! Important Considerations When Using Smart Home Devices

Your Smart Speaker Might Be 'Listening'! Important Considerations When Using Smart Home Devices

With the popularity of artificial intelligence and Internet of Things (IoT) technologies, smart home products such as smart locks, robotic vacuum cleaners, and smart whole-house temperature control systems are becoming increasingly common. It is important to note that if sensitive data from smart home products is exploited by malicious individuals, it could lead to information … Read more

What is Bluetooth Man-in-the-Middle Attack?

What is Bluetooth Man-in-the-Middle Attack?

What is Bluetooth Man-in-the-Middle Attack? A man-in-the-middle attack occurs when an attacker inserts themselves between two devices, intercepting their communication and possibly altering the data, often without the users’ knowledge. In Bluetooth, this typically happens with Bluetooth Low Energy (BLE) devices, such as smartwatches. How the attack is carried out: 1.The attacker must be within … Read more

Exploring and Reflecting on the Attack Surface of QEMU Virtualization Security

Exploring and Reflecting on the Attack Surface of QEMU Virtualization Security

QEMU and KVM, as typical representatives of virtualization technology, are widely used in cloud computing systems across various vendors. As software with over a decade of history, QEMU has been plagued by security issues. With the continuous development of cloud computing based on QEMU/KVM virtualization software, its security problems have garnered significant attention in recent … Read more

A Decade of Vigilance: Safeguarding Industrial Control System Security Against the Resurgence of Stuxnet

A Decade of Vigilance: Safeguarding Industrial Control System Security Against the Resurgence of Stuxnet

【Introduction】Today marks the tenth anniversary of the “Stuxnet” virus.Since its first attack in 2009, this virus, known as a “super destructive weapon,” has been in a decade-long game of cat and mouse with global industrial control systems.If we consider a decade as a cycle, then in this era where “cyber warfare” could erupt at any … Read more

C++ Embedded System Security: Protection and Vulnerability Mitigation

C++ Embedded System Security: Protection and Vulnerability Mitigation

C++ Embedded System Security: Protection and Vulnerability Mitigation In today’s technological environment, embedded systems have become increasingly important due to their widespread applications in areas such as IoT devices, home appliances, automotive, and medical equipment. However, as these systems are often connected to networks, they also face numerous security threats. This article will detail how … Read more

Siemens SPPA-T3000 Control System Exposes Critical Vulnerabilities, Leaving Global Power Plants at Risk!

Siemens SPPA-T3000 Control System Exposes Critical Vulnerabilities, Leaving Global Power Plants at Risk!

Recently, Siemens announced that its industrial equipment, commonly used in petrochemical plants and large renewable energy power plants, has 54 security vulnerabilities. Among these, the most severe vulnerabilities can be exploited for denial-of-service (DoS) attacks or remote code execution on arbitrary servers, putting power plants at risk of failure and halting electricity generation. More alarmingly, … Read more

Exploring Vulnerabilities in the VMware Workstation Renderer

Exploring Vulnerabilities in the VMware Workstation Renderer

Background In mid-January, ZDI announced the rules for the 2017 competition, which included a substantial reward for teams that could break VMware and achieve virtual machine escape. VMware is no longer a new target; it was identified as a target in 2016. As a target, VMware has undergone various attacks, with many points of attack … Read more

Breaking the Myth of Air-Gapped Network Security! Air-Gapped Networks Still Vulnerable to DNS Attacks

Breaking the Myth of Air-Gapped Network Security! Air-Gapped Networks Still Vulnerable to DNS Attacks

In May 2022, Dark Reading reported that researchers from Nozomi Networks discovered that common misconfigurations of the Domain Name System (DNS) in enterprise environments could expose air-gapped networks and their high-value assets to external attackers. A blog post by Nozomi Networks’ ICS analyst team explained that this flaw exists in all versions of the widely … Read more