Guru3D.com
  • HOME
  • NEWS
    • Channels
    • Archive
  • DOWNLOADS
    • New Downloads
    • Categories
    • Archive
  • GAME REVIEWS
  • ARTICLES
    • Rig of the Month
    • Join ROTM
    • PC Buyers Guide
    • Guru3D VGA Charts
    • Editorials
    • Dated content
  • HARDWARE REVIEWS
    • Videocards
    • Processors
    • Audio
    • Motherboards
    • Memory and Flash
    • SSD Storage
    • Chassis
    • Media Players
    • Power Supply
    • Laptop and Mobile
    • Smartphone
    • Networking
    • Keyboard Mouse
    • Cooling
    • Search articles
    • Knowledgebase
    • More Categories
  • FORUMS
  • NEWSLETTER
  • CONTACT

New Reviews
ASUS GeForce RTX 4080 Noctua OC Edition review
MSI Clutch GM51 Wireless mouse review
ASUS ROG STRIX B760-F Gaming WIFI review
Asus ROG Harpe Ace Aim Lab Edition mouse review
SteelSeries Arctis Nova Pro Headset review
Ryzen 7800X3D preview - 7950X3D One CCD Disabled
MSI VIGOR GK71 SONIC Blue keyboard review
AMD Ryzen 9 7950X3D processor review
FSP Hydro G Pro 1000W (ATX 3.0, 1000W PSU) review
Addlink S90 Lite 2TB NVMe SSD review

New Downloads
Intel ARC graphics Driver Download Version: 31.0.101.4148
GeForce 531.29 WHQL driver download
CrystalDiskInfo 9.0.0 Beta3 Download
AMD Ryzen Master Utility Download 2.10.2.2367
AMD Radeon Software Adrenalin 23.3.1 WHQL download
Display Driver Uninstaller Download version 18.0.6.1
CPU-Z download v2.05
AMD Chipset Drivers Download 5.02.19.2221
GeForce 531.18 WHQL driver download
ReShade download v5.7.0


New Forum Topics
I can not get ANY game to launch at 120hz on my 6700XT Some GeForce RTX 4070 Graphics cards May get a 16-Pin Power Connection. NVIDIA GeForce 531.29 WHQL driver Download & Discussion Crucial PCIe 5.0 SSD, T700, Impresses with Compact Heatsink and High Speeds Info Zone - gEngines, Ray Tracing, DLSS, DLAA, TSR, FSR, XeSS, DLDSR etc. who knows how to fix this visual issue (i think it is motherboard) Review: ASUS GeForce RTX 4080 Noctua OC Edition NVIDIA Brings Ultra-Realism to Video Games with AI and Path Tracing Technologies GPU Crashing Fake Samsung 980 Pro SSDs on the Rise: Beware of Counterfeit Drives




Guru3D.com » News » Millions Linksys and Netgear other routers and IoT devices are vulnerable to DNS poisoning

Millions Linksys and Netgear other routers and IoT devices are vulnerable to DNS poisoning

by Hilbert Hagedoorn on: 05/05/2022 08:34 AM | source: Bleeping Computer | 10 comment(s)
Millions Linksys and Netgear other routers and IoT devices are vulnerable to DNS poisoning

An unresolved DNS vulnerability affects millions of Linksys and Netgear routers, as well as other IoT equipment. Nozomi Networks Labs security researchers found CVE-2022-05-02, a DNS implementation flaw in two prominent C libraries. uClibc and uClibc-ng are commonly found in routers and IoT devices.

DNS poisoning is essentially fooling the target device into pointing to an arbitrarily defined endpoint and communicating with it over the network. The attacker would then be able to divert traffic to a server under their direct control. A threat actor can employ DNS poisoning or DNS spoofing to send the victim to a malicious website hosted at an IP address on the attacker's server rather than the genuine destination. The OpenWRT team's fork, uClibc-ng, and the library uClibc. Both types are extensively utilized by major companies like as Netgear, Axis, and Linksys, as well as embedded Linux releases. According to Nozomi Networks experts, a remedy from the uClibc developer is not yet available, putting products from up to 200 companies at risk.

  • "Because this vulnerability remains unpatched, for the safety of the community, we cannot disclose the specific devices we tested on," says Nozomi
  • "We can, however, disclose that they were a range of well-known IoT devices running the latest firmware versions with a high chance of them being deployed throughout all critical infrastructure."

Users of IoT and router devices should keep a lookout for new firmware releases from suppliers and install the most recent upgrades as soon as they are available.



Millions Linksys and Netgear other routers and IoT devices are vulnerable to DNS poisoning




« Qualcomm Introduces Wi-Fi 7 Networking Pro Series - Up to 33.1 Gbps · Millions Linksys and Netgear other routers and IoT devices are vulnerable to DNS poisoning · Advertisement: May sale: Windows 10 lifetime license only $12 »

Related Stories

Intel Determined to bring gamers millions of Intel ARC GPUs each year - 01/31/2022 10:27 AM
When it comes to GPUs, the situation has reached rock bottom, with interesting GPUs selling out instantly or at exorbitant prices, and brands releasing products that would never have existed in a norm...

Facebook stored millions of passwords unencrypted - 03/22/2019 09:57 AM
The credit for c***up of the year goes to Facebook. The company keeps promising things but as it now turns out it stored the passwords of hundreds of millions of users completely unencrypted, yes that...

DRAM makers likely to get fined millions (if not billions) on antitrust fines in China - 06/21/2018 04:39 PM
The Chinese authorities have been investigating the DRAM market for a while now. We've reported on this topic several already. From the looks of it, things are about the get worse for the big three M...

Millions Of Routers Vulnerable To Attacks Due To NetUSB Bug - 05/25/2015 08:46 AM
A serious vulnerability affecting the NetUSB kernel driver developed by Taiwan-based tech company KCodes exposes millions of routers to hack attacks, researchers have warned. According to its website,...

Millions of infected machines might go offline March 8 - - 02/18/2012 02:02 PM
In three weeks, the FBI could knock millions of infected systems offline by disabling some DNS servers as techspot reported. In November, Estonian authorities arrested six men suspected of using &quot...


2 pages 1 2


Ub3rslay3r
Junior Member



Posts: 13
Joined: 2008-02-16

#6015928 Posted on: 05/10/2022 01:14 PM
I manually configure DNS on my network adapters.
Only needs to be done once.

Yeah on everything my self I have DNS set up to 1.1.1.1 !
I just read the CVE and some additional articles about it. Turns out static DNS addresses won't help here. Even if you have a static IP address on all of your devices, the DNS requests must still traverse your router and proceed to whatever destination you have set. Any infected device between the client and the DNS server can attempt to respond with a malicious DNS response while masquerading as the correct DNS server. DNS is a well-known protocol and is not encrypted.

Here's another interesting bit about DNS IP addresses. I know some ISPs and consumer routers (usually ISP rentals) have been known to replace the destination DNS IP address found in a packet with the "preferred" DNS IP address all done transparently to the user so you would never know, unless you have a packet sniffer sitting between the router and the ISP (which only catches the router's replacement and not the ISP's replacement). Destination DNS IP replacement is also very likely to happen with an infected router.

Venix
Senior Member



Posts: 2978
Joined: 2016-08-01

#6015931 Posted on: 05/10/2022 01:27 PM
I just read the CVE and some additional articles about it. Turns out static DNS addresses won't help here. Even if you have a static IP address on all of your devices, the DNS requests must still traverse your router and proceed to whatever destination you have set. Any infected device between the client and the DNS server can attempt to respond with a malicious DNS response while masquerading as the correct DNS server. DNS is a well-known protocol and is not encrypted.

Here's another interesting bit about DNS IP addresses. I know some ISPs and consumer routers (usually ISP rentals) have been known to replace the destination DNS IP address found in a packet with the "preferred" DNS IP address all done transparently to the user so you would never know, unless you have a packet sniffer sitting between the router and the ISP (which only catches the router's replacement and not the ISP's replacement). Destination DNS IP replacement is also very likely to happen with an infected router.

I see that seems like a major headache thanks for the info!

AuerX
Senior Member



Posts: 1101
Joined: 2018-12-12

#6015936 Posted on: 05/10/2022 01:39 PM
So, if one really isnt a network enthusiast/pro, how does one protect things from this?

Asking for a friend.

Mufflore
Senior Member



Posts: 13953
Joined: 2010-05-22

#6015938 Posted on: 05/10/2022 01:44 PM
So, if one really isnt a network enthusiast/pro, how does one protect things from this?

Asking for a friend.

Hope you havent got vulnerable equipment.
Info on whats affected hasnt been released yet.

Ub3rslay3r
Junior Member



Posts: 13
Joined: 2008-02-16

#6015951 Posted on: 05/10/2022 02:13 PM
So, if one really isnt a network enthusiast/pro, how does one protect things from this?

Asking for a friend.
Basically what Mufflore said. Also, make sure your devices use the firewalls built into them whenever possible. Thankfully, most reputable manufacturers will update the firmware on their devices to patch issues like this fairly quickly, so also be sure to watch for firmware updates. If you want to keep an eye on the list of vulnerable devices as it's updated, check this when you can: https://www.kb.cert.org/vuls/id/473698

If you really want to go for it, you can set-up your own DNS server, and ensure it doesn't use the affected libraries, but that opens up a lot of other possible issues and vulnerabilities, so I don't recommend it for individuals.

2 pages 1 2


Post New Comment
Click here to post a comment for this news story on the message forum.


Guru3D.com © 2023