4.3 CVE-2024-40090

 

Vilo 5 Mesh WiFi System <= 5.16.1.33 is vulnerable to Information Disclosure. An information leak in the Boa webserver allows remote, unauthenticated attackers to leak memory addresses of uClibc and the stack via sending a GET request to the index page.
https://nvd.nist.gov/vuln/detail/CVE-2024-40090

Categories

CWE-319 : Cleartext Transmission of Sensitive Information
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) Before transmitting, encrypt the data using reliable, confidentiality-protecting cryptographic protocols. When using web applications with SSL, use SSL for the entire session from login to logout, not just for the initial login page. When designing hardware platforms, ensure that approved encryption algorithms (such as those recommended by NIST) protect paths from security critical data to trusted user applications. Use tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session. These may be more effective than strictly automated techniques. This is especially the case with weaknesses that are related to design and business rules. Configure servers to use encrypted channels for communication, which may include SSL or other secure protocols. Programmable Logic Controller (PLC) sends sensitive information in plaintext, including passwords and session tokens. Building Controller uses a protocol that transmits authentication credentials in plaintext. Programmable Logic Controller (PLC) sends password in plaintext. Passwords transmitted in cleartext. Chain: Use of HTTPS cookie without "secure" flag causes it to be transmitted across unencrypted HTTP. Product sends password hash in cleartext in violation of intended policy. Remote management feature sends sensitive information including passwords in cleartext. Backup routine sends password in cleartext in email. Product transmits Blowfish encryption key in cleartext. Printer sends configuration information, including administrative password, in cleartext. Chain: cleartext transmission of the MD5 hash of password enables attacks against a server that is susceptible to replay (CWE-294). Product sends passwords in cleartext to a log server. Product sends file with cleartext passwords in e-mail message intended for diagnostic purposes.

References


 

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
102 Session Sidejacking
High
117 Interception
Medium
383 Harvesting Information via API Event Monitoring
Low
477 Signature Spoofing by Mixing Signed and Unsigned Content
High
65 Sniff Application Code
High


MITRE


Techniques

id description
T1040 Network Sniffing
T1056.004 Input Capture: Credential API Hooking
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
T1040 In cloud environments, ensure that users are not granted permissions to create or modify traffic mirrors unless this is explicitly required.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.