Port 32764 Router Backdoor is Back (or was it ever gone?)

Published: 2014-04-22. Last Updated: 2014-04-22 23:34:32 UTC
by Johannes Ullrich (Version: 1)
0 comment(s)

Unlike announced a few month ago, the infamous "Port 32764" backdoor was not fully patched in new routers [1]. As a reminder, the original backdoored allowed unrestricted/unauthenticated root access to a router by connecting to port 32764. The backdoor was traced back to components manufactures by Sercomm. Sercomm delivers parts for a number of name brand routers sold under the brands of Cisco, Linksys, Netgear, Diamond and possibly others.

An analysis of an updates router by Synacktive revealed that the code implementing the backdoor is still present, and can be activated to listen again by sending a specific Ethernet packet. The packet would not be routed, so an attacker has to have access to the local network the router is connected to, which significantly lowers the probability of exploitation, but doesn't eliminate it.

The packet activating the backdoor is identified by an Ethernet type of 0x8888.

[1] http://www.synacktiv.com/ressources/TCP32764_backdoor_again.pdf

------
Johannes B. Ullrich, Ph.D.
SANS Technology Institute
Twitter

Keywords:
0 comment(s)

Apple Patches for OS X, iOS and Apple TV.

Published: 2014-04-22. Last Updated: 2014-04-22 23:27:33 UTC
by Johannes Ullrich (Version: 1)
0 comment(s)

Apple today released patches for OS X, iOS and Apple TV. The OS X patches apply for versions of OS X back to Lion (10.7.5). Vulnerabilities fixed by these patches can lead to remote code execution by visiting malicious web sites.

For more details, see Apples security update page [1]. Links to the actual update details should become available shortly.

[1] http://support.apple.com/kb/HT1222

------
Johannes B. Ullrich, Ph.D.
SANS Technology Institute
Twitter

Keywords: Apple Patches
0 comment(s)
ISC StormCast for Tuesday, April 22nd 2014 http://isc.sans.edu/podcastdetail.html?id=3945

Comments


Diary Archives