Severe SDK vulnerabilities at Broadcom due to copy-paste engineering
- Cisco small business routers and other well-known manufacturers affected
- Vulnerabilities discovered as early as 2011, yet still resurface
The Supply chain requires control
Among others, the Cisco routers of the small business series RV110W, RV130, RV130W and RV215W, which are used by thousands of companies, are affected by the security vulnerabilities. This allows remote control of the router and a denial of service (DoS) attack via the Universal Plug-and-Play (UPnP) function. The vulnerability is listed under CVE-2021-34730 with a risk rating of 9.8 (critical) for Cisco. Identifying the affected devices is problematic. To date, Broadcom has not provided any information about which versions of the SDK are affected. As was the case with the Realtek vulnerability, which was distributed hundreds of thousands of times worldwide, IoT Inspector offers a free service that allows users to check whether said vulnerability impacts a product in use from the aforementioned manufacturers. “The real vulnerability lies in the supply chain. Device manufacturers use third-party building blocks and install them without checking the source codes. Things must change quickly to create transparency and force hackers on the defensive whenever possible,” explains Florian Lukavsky of IoT Inspector.Copy-Paste-Engineering
At the root of such vulnerabilities is the use of existing software development kits that are simply rewritten for new devices. In doing so, the potential for damage lies hugely hidden in the depth of the code. “Vulnerabilities like these often disappear somewhere deep in the code and are hardly noticed during the development of components such as Wi-Fi routers. However, this potentiates the associated danger, while making it more difficult to trace the flaws,” Florian Lukavsky sums up. The IoT Inspector platform can detect numerous vulnerabilities during an automated firmware check. Elimination is then once again up to the respective manufacturer or distributor, both in ongoing production and for existing devices on the market that require a patch. Yet, IoT Inspector's experience shows that even these can harbor risks, since it is not uncommon for new vulnerabilities to be generated as a result of an untested patch.Über Onekey
EIN SCHLÜSSEL ist der führende europäische Spezialist für Product Cybersecurity & Compliance Management und Teil des Anlageportfolios von PricewaterhouseCoopers Deutschland (PwC). Die einzigartige Kombination aus einer automatisierten Product Cybersecurity & Compliance Platform (PCCP) mit Expertenwissen und Beratungsdiensten bietet schnelle und umfassende Analyse-, Support- und Verwaltungsfunktionen zur Verbesserung der Produktsicherheit und -konformität — vom Kauf über das Design, die Entwicklung, die Produktion bis hin zum Ende des Produktlebenszyklus.
KONTAKT:
Sarah Fortmann
Leiter Marketing
sara.fortmann@onekey.com
euromarcom public relations GmbH
+49 611 973 150
team@euromarcom.de
Bereit zur automatisierung ihrer Cybersicherheit & Compliance?
Machen Sie Cybersicherheit und Compliance mit ONEKEY effizient und effektiv.