A vulnerability in Edge Routers’s and AirCube’s miniupnpd

0
46

[ad_1]

AirCube is a wireless access point device used in homes and Edge Routers are special routers manufactured by Ubiquiti that act at the network boundary and allow an internal network to connect to an external network.

MiniUPnPd (Mini Universal Plug aNd Play) is a small daemon that initiates the UPnP and NatPMP (Network Address Translation Port Mapping Protocol) for a device. These two services allow port redirection to any client on the network.

Recent reports from SSD suggest that MiniUPnPd service on the Aircube and Edge routers are vulnerable to an internal heap overflow that can lead potentially to execute arbitrary code.

CVE(s):

CVE-2023-31998: Heap Overflow in the miniupnpd leads to Arbitrary code execution

This vulnerability exists in the /etc/init.d/upnpd which exposes a dynamic TCP port to LAN clients, allowing threat actors to execute a heap overflow attack resulting in an arbitrary code execution.

The CVSS score and vector for this Edge Routers vulnerability are yet to be confirmed.

Vulnerability Details

Miniupnpd allows the configuration of NAT entries with a function called Internet Gateway Daemon. In Linux, the NAT entries are handled with the help of iptables or nftables. However, iptables used the function get_port_mappings_in_range function to get the external NAT entries and ports. 

Image: miniupnpd functionality diagram

The default allocation of array memory is set to 128 ports as the number of external port entries is not known in advance. If the entries exceed the number of port entries, the reallocation of memory is not updated accordingly, leading to a heap overflow.

SSD has published detailed information about this Edge Routers vulnerability.

Affected Products and Fixed Versions

A security advisory has also been published for this vulnerability.

Affected Products Fixed in Versions
UPnP-enabled EdgeRouters running 2.0.9-hotfix.6 and earlier. Update affected EdgeRouters to 2.0.9-hotfix.7 or later.
UPnP-enabled Aircubes running 2.8.8 and earlier. Update affected Aircubes to 2.8.9 or later.

Users of these products are advised to upgrade to the latest versions to fix this vulnerability and prevent threat actors.

“AI-based email security measures Protect your business From Email Threats!” – Request a Free Demo.

[ad_2]

Source link