Millions Linksys and Netgear other routers and IoT devices are vulnerable to DNS poisoning
An unresolved DNS vulnerability affects millions of Linksys and Netgear routers, as well as other IoT equipment. Nozomi Networks Labs security researchers found CVE-2022-05-02, a DNS implementation flaw in two prominent C libraries. uClibc and uClibc-ng are commonly found in routers and IoT devices.
DNS poisoning is essentially fooling the target device into pointing to an arbitrarily defined endpoint and communicating with it over the network. The attacker would then be able to divert traffic to a server under their direct control. A threat actor can employ DNS poisoning or DNS spoofing to send the victim to a malicious website hosted at an IP address on the attacker's server rather than the genuine destination. The OpenWRT team's fork, uClibc-ng, and the library uClibc. Both types are extensively utilized by major companies like as Netgear, Axis, and Linksys, as well as embedded Linux releases. According to Nozomi Networks experts, a remedy from the uClibc developer is not yet available, putting products from up to 200 companies at risk.
- "Because this vulnerability remains unpatched, for the safety of the community, we cannot disclose the specific devices we tested on," says Nozomi
- "We can, however, disclose that they were a range of well-known IoT devices running the latest firmware versions with a high chance of them being deployed throughout all critical infrastructure."
Users of IoT and router devices should keep a lookout for new firmware releases from suppliers and install the most recent upgrades as soon as they are available.
Intel Determined to bring gamers millions of Intel ARC GPUs each year - 01/31/2022 10:27 AM
When it comes to GPUs, the situation has reached rock bottom, with interesting GPUs selling out instantly or at exorbitant prices, and brands releasing products that would never have existed in a norm...
Facebook stored millions of passwords unencrypted - 03/22/2019 09:57 AM
The credit for c***up of the year goes to Facebook. The company keeps promising things but as it now turns out it stored the passwords of hundreds of millions of users completely unencrypted, yes that...
DRAM makers likely to get fined millions (if not billions) on antitrust fines in China - 06/21/2018 04:39 PM
The Chinese authorities have been investigating the DRAM market for a while now. We've reported on this topic several already. From the looks of it, things are about the get worse for the big three M...
Millions Of Routers Vulnerable To Attacks Due To NetUSB Bug - 05/25/2015 08:46 AM
A serious vulnerability affecting the NetUSB kernel driver developed by Taiwan-based tech company KCodes exposes millions of routers to hack attacks, researchers have warned. According to its website,...
Millions of infected machines might go offline March 8 - - 02/18/2012 02:02 PM
In three weeks, the FBI could knock millions of infected systems offline by disabling some DNS servers as techspot reported. In November, Estonian authorities arrested six men suspected of using "...
Senior Member
Posts: 7108
Joined: 2008-03-06
The S in the IoT stands for security.
Sarcasm aside, hope that a patch will be released soon.
Member
Posts: 33
Joined: 2020-03-23
OpenWRT is not using uClibc/uClibc-ng since 2015: https://forum.openwrt.org/t/nozomi-dns-poisoning-bug-affects-openwrt/126768
Senior Member
Posts: 13954
Joined: 2010-05-22
I manually configure DNS on my network adapters.
Only needs to be done once.
Senior Member
Posts: 2980
Joined: 2016-08-01
I manually configure DNS on my network adapters.
Only needs to be done once.
Yeah on everything my self I have DNS set up to 1.1.1.1 !
Senior Member
Posts: 8630
Joined: 2010-08-28
Still using a Netgear R7000 Nighthawk, it's running Xwrt-Vortex.