Roughly 500,000 Ubiquity devices may be affected by flaw already exploited in the wild

Original Post from Security Affairs
Author: Pierluigi Paganini

Security experts identified nearly 500,000 Ubiquity devices that may be affected by a vulnerability that has already been exploited in the wild.

Security experts are warning Ubiquity users of a vulnerability that has already been exploited in the wild.

Last week, the researcher Jim Troutman, consultant and director of the Northern New England Neutral Internet Exchange (NNENIX), revealed that threat actors had been targeting Ubiquity installs exposed online. Remote attackers were targeting the networking devices exposed via a discovery service accessible on UDP port 10001.

According to the expert, the devices are affected by a DoS flaw that attackers were attempting to trigger.

The vulnerability is not a novelty in the security and Ubiquity communities, in June the issue was discussed in a thread on the Ubiquity forums where users were warning of a possible exploit used in the wild.

Now security experts at Rapid7 revealed that they were monitoring suspicious traffic destined for port 10001 for at least one year.

Ubiquity is aware of the issue and is currently working on a firmware update that will address it anyway it is trying to downplay it.

“There has been some discussion lately about a bug in airOS which can result in management access to airOS devices becoming inoperable until these devices are rebooted. This issue appears to be caused by external access to airOS devices using port 10001. As a temporary workaround for this issue while it is being investigated and resolved by the development team, network operators can block port 10001 at the network perimeter.” reads the advisory published by Ubiquity.

“To our current knowledge, this issue cannot be used to gain control of network devices or to create a DDoS attack.” 

Waiting for a fix, Ubiquity recommends blocking UDP port 10001, but this solution could have a disruptive effect on some services.

Scanning the Internet for vulnerable devices using the Rapid7’s Sonar project, experts found roughly 490,000 devices exposed online. Most of the vulnerable Ubiquity devices are located in Brazil, followed by the United States, and Spain.

ubiquity vulnerable

“By decoding the responses, we are able to learn about the nature of these devices and clues as to how or why they are exposed publicly.” continues Rapid7. For example, by grouping by the model names returned by these responses, we see big clusters around all sorts of Ubiquiti models/devices:”

Product n
NanoStation 172,563
AirGrid 131,575
LiteBeam 43,673
PowerBeam 40,092

The analysis of the names of the device revealed that in 17,000 cases they contain the string “HACKED-ROUTER-HELP-SOS,” a circumstance that suggests that they have already been hacked by exploiting other vulnerabilities.

Rapid7 reported its findings to US-CERT, CERT Brazil, and of course Ubiquiti.

Pierluigi Paganini

(Security Affairs – SS7 protocol, Metro Bank)

The post Roughly 500,000 Ubiquity devices may be affected by flaw already exploited in the wild appeared first on Security Affairs.

Go to Source
Author: Pierluigi Paganini

WordPress Appliance - Powered by TurnKey Linux