Breaking
March 12, 2025

This Week in Security: Medical Backdoors, Strings, and Changes at Let’s Encrypt Jonathan Bennett | usagoldmines.com

There are some interesting questions afoot, with the news that the Contec CMS8000 medical monitoring system has a backdoor. And this isn’t the normal debug port accidentally left in the firmware. The CISA PDF has all the details, and it’s weird. The device firmware attempts to mount an NFS share from an IP address owned by an undisclosed university. If that mount command succeeds, binary files would be copied to the local filesystem and executed.

Additionally, the firmware sends patient and sensor data to this same hard-coded IP address. This backdoor also includes a system call to enable the eth0 network before attempting to access the hardcoded IP address, meaning that simply disabling the Ethernet connection in the device options is not sufficient to prevent the backdoor from triggering. This is a stark reminder that in the firmware world, workarounds and mitigations are often inadequate. For instance, you could set the gateway address to a bogus value, but a slightly more sophisticated firmware could trivially enable a bridge or alias approach, completely bypassing those settings. There is no fix at this time, and the guidance is pretty straightforward — unplug the affected devices.

Reverse Engineering Using… Strings

The Include Security team found a particularly terrifying “smart” device to tear apart: the GoveeLife Smart Space Heater Lite. “Smart Space Heater” should probably be terrifying on its own. It doesn’t get much better from there, when the team found checks for firmware updates happening over unencrypted HTTP connections. Or when the UART password was reverse engineered from the readily available update. It’s not a standard Unix password, just a string comparison with a hardcoded value, and as such readily visible in the strings output.

Now on to the firmware update itself. It turns out that, yes, the device will happily take a firmware update over that unencrypted HTTP connection. The first attempt at running modified firmware failed, with complaints about checksum failures. Turns out it’s just a simple checksum appended to the firmware image. The device has absolutely no protection against running custom firmware. So this leads to the natural question, what could an attacker actually do with access to a device like this?

The proof of concept attack was to toggle the heat control relay for every log message. In a system like this, one would hope there would be hardware failsafes that turn off the heating element in an overheat incident. Considering that this unit has been formally recalled for over 100 reports of overheating, and at least seven fires caused by the device, that hope seems to be in vain.

AMD Releases

We wrote about the mysterious AMD vulnerability a couple weeks ago, and the time has finally come for the full release. It’s officially CVE-2024-56161, “Improper signature verification in AMD CPU ROM microcode patch loader”. The primary danger seems to be malicious microcode that could be used to defeat AMD’s Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP) technology. In essence, an attacker with root access on a hypervisor could defeat this VM encryption guarantee and compromise the VMs on that system.

This issue was found by the Google Security Team, and there is a PoC published that demonstrates the attack with benign effects.

The Mirai Two-fer

The Mirai botnet seems to have picked up a couple new tricks, with separate strains now attacking Zyxel CPE devices and Mitel SIP phones. Both attacks are actively being exploited, and the Zyxel CPE flaw seems to be limited to an older, out-of-support family of devices. So if you’re running one of the approximately 1,500 “legacy DSL CPE” devices, it’s time to pull the plug. Mitel has published an advisory as well, and is offering firmware updates to address the vulnerability.

Let’s Encrypt Changes

A service many of us depend on is making some changes. Let’s Encrypt is no longer going to email you when your certificate is about to expire. The top reason is simple. It’s getting to be a lot of emails to send, and sending emails can get expensive when you measure them in the millions.

Relatedly, Let’s Encrypt is also about to roll out new six-day certificates. Sending out email reminders for such short lifetimes just doesn’t make much sense. Finally from Let’s Encrypt is a very useful new feature, the IP Address certificate. If you’ve ever found yourself wishing you didn’t have to mess with DNS just to get an HTTPS certificate, Let’s Encrypt is about to have you covered.

Bits and Bytes

There’s a Linux vulnerability in the USB Video Class driver, and CISA has issued an active exploit warning for it. And it’s interesting, because it’s been around for a very long time, and it was disclosed in a Google Android Security Bulletin. It’s been suggested that this was a known vulnerability, and was used in forensic tools for Android, in the vein of Cellebrite.

Pretty much no matter what program you’re using, it’s important to never load untrusted files. The latest application to prove this truism is GarageBand. The details are scarce, but know that versions before 10.4.12 can run arbitrary code when loading malicious images.

Ever wonder how many apps Google blocks and pulls from the app store? Apparently better than two million in 2024. The way Google stays mostly on top of that pile of malware is the use of automated tools, which now includes AI tools. Which, yes, is a bit terrifying, and has caused problems in other Google services. YouTube in particular comes to mind, where channels get content strikes for seemingly no reason, and have trouble finding real human beings at Google to take notice and fix what the automated system has mucked up.

And finally, echoing what Kee had to say on the subject, cryptocurrency fraud really is just fraud. And [Andean Medjedovic] of Canada found that out the hard way, after his $65 million theft landed him in jail on charges of wire fraud, computer hacking, and attempted extortion.

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

I2C Sniffing Comes to the Bus Pirate 5 Tom Nardi | usagoldmines.com

Classy Paper Tape Reader Complements Homebrew Retrocomputer Dan Maloney | usagoldmines.com

Lies, Damned Lies, And IGBT Datasheets Jenny List | usagoldmines.com

How To Use LLMs For Programming Tasks Donald Papp | usagoldmines.com

A Magic Eye Tube Does All The Work In This Kit Jenny List | usagoldmines.com

A Deep Dive Into Canon Autofocus Lenses Maya Posch | usagoldmines.com

Keebin’ with Kristina: the One with the Batwing Typewriter Kristina Panos | usagoldmines.com

Tiny Laptop Gets a New Case and an Unlocking Dan Maloney | usagoldmines.com

TrapC: A C Extension For the Memory Safety Boogeyman Maya Posch | usagoldmines.com

Josephine Cochrane Invented the Modern Dishwasher — In 1886 Donald Papp | usagoldmines.com

Homebrew Traffic Monitor Keeps Eyes on the Streets Tom Nardi | usagoldmines.com

Hacking a Heavyweight Philco Radio Heidi Ulrich | usagoldmines.com

Satellite Imagery You Can Play With Jenny List | usagoldmines.com

What’s Wrong With This Antenna Tuner? Al Williams | usagoldmines.com

Solar-Powered E-Reader With No Buttons Bryan Cockfield | usagoldmines.com

Freeing Windows Al Williams | usagoldmines.com

Conservationists Are Flying Microlites To Teach Birds How To Migrate Lewin Day | usagoldmines.com

The ESP32 Bluetooth Backdoor That Wasn’t Maya Posch | usagoldmines.com

Inexpensive Repairable Laptops, With Apple Style Bryan Cockfield | usagoldmines.com

Ripple Co-Founder Chris Larsen Lost $661,623,870 in XRP Due to LastPass Hack: Report Alex Richardson...

You Are Already Traveling at the Speed of Light Al Williams | usagoldmines.com

ZX Spectrum, Soviet Style: A 44-IC Clone You Can Build Heidi Ulrich | usagoldmines.com

IPV4, IPV6… Hey! What Happened to IPV5? Al Williams | usagoldmines.com

Clock Mechanism Goes Crazy for Arduino Al Williams | usagoldmines.com

Hackaday Links: March 9, 2025 Dan Maloney | usagoldmines.com

Deep Drawing with Ultrasonics Al Williams | usagoldmines.com

Old Chromebooks Get Second Life as Video Wall Tom Nardi | usagoldmines.com

Taming the Wobble: An Arduino Self-Balancing Bot Heidi Ulrich | usagoldmines.com

Fixing an Unpleasant SD Card Slot Issue In a NanoVNA Maya Posch | usagoldmines.com

The Coolest Batteries You’ve Never Heard Of Heidi Ulrich | usagoldmines.com

Retrotechtacular: Better Living Through Nuclear Chemistry Dan Maloney | usagoldmines.com

Fictional Computers: EMERAC was the Chatbot of 1957 Al Williams | usagoldmines.com

Writing an OLED Display Driver in MicroZig Maya Posch | usagoldmines.com

Expensive Camera, Cheap 3D-Printed Lens Jenny List | usagoldmines.com

Bank of America Warns Social Security Numbers, IDs and Other Sensitive Customer Data Potentially Exp...

Transceiver Reveals Unusual Components Al Williams | usagoldmines.com

$830,000 Drained From Wells Fargo As Customer Executes Brazen Attack, Triggers Fraudulent Bank Trans...

Physical Computing Used to be a Thing Elliot Williams | usagoldmines.com

The Pentium Processor’s Innovative (and Complicated) Method of Multiplying by Three, Fast Donald Pap...

Retail Pharmacy Giant Handing $6,800,000 To Customers After Hackers Trigger Massive Data Breach Dail...

Get Into Meshtastic On the Cheap With This Tiny Node Kit Dan Maloney | usagoldmines.com

The Road to Lucid Dreaming Might be Paved With VR Donald Papp | usagoldmines.com

This Laser Knows about Gasses Al Williams | usagoldmines.com

Trump Sues Capital One After Slamming Bank of America, JPMorgan Chase Over Abrupt Bank Account Termi...

Tearing Down a Vintage Word Processor Al Williams | usagoldmines.com

Trio of Mods Makes Delta Printer More Responsive, Easier to Use Dan Maloney | usagoldmines.com

Run Xbox 360 Games on Your PC With XenonDecomp Maya Posch | usagoldmines.com

Open Source Hardware, How Open Do You Want It To Be? Jenny List | usagoldmines.com

Hackaday Podcast Episode 311: AirTag Hack, GPS Rollover, and a Flat-Pack Toaster Tom Nardi | usagold...

GNSS Signals Tracked on the Moon By LuGRE Maya Posch | usagoldmines.com

This Week in Security: Zen Jailbreak, Telegram Exploit, and VMware Hyperjack Jonathan Bennett | usag...

The Long Goodbye: More Instruments Shut Down on the Voyagers as End Nears Maya Posch | usagoldmines....

Open Safety In The Auto Business: Renault Shares Its Battery Fire Suppression Tech Jenny List | usag...

Repairing a 1955 Classic Radio Al Williams | usagoldmines.com

Combined Crypto, Anglo-American Style Al Williams | usagoldmines.com

The Strange Afterlife of the Xbox Kinect Dave Rowntree | usagoldmines.com

Plastic Gear Repair Al Williams | usagoldmines.com

Custom Touchpad PCBs Without The Pain Jenny List | usagoldmines.com

Hackaday Europe 2025 Welcomes David Cuartielles, Announces Friday Night Bring-a-Hack Elliot Williams...

Hacking Digital Calipers for Automated Measurements and Sorta-Micron Accuracy Dan Maloney | usagoldm...

Why 56k Modems Relied On Digital Phone Lines You Didn’t Know We Had Lewin Day | usagoldmines.com

The Future We Never Got, Running a Future We Got Jenny List | usagoldmines.com

Rackmount all the Things, Hi-Fi Edition Heidi Ulrich | usagoldmines.com

A TV With Contrast You Haven’t Seen For Years Jenny List | usagoldmines.com

Ptychography for High Resolution Microscopy Al Williams | usagoldmines.com

Designing a Toy Conveyor Belt For Fun and Profit Kristina Panos | usagoldmines.com

Piggyback Board Brings Touch Sensing to USB Soldering Iron Dan Maloney | usagoldmines.com

FLOSS Weekly Episode 823: TuxCare, 10 Years Without Rebooting! Jonathan Bennett | usagoldmines.com

Haptic Displays Bring Sports To The Vision Impaired Lewin Day | usagoldmines.com

Is This The Oldest HD Video Online? Jenny List | usagoldmines.com

Big Chemistry: Glass Dan Maloney | usagoldmines.com

China Claims Commercial Nuclear Fusion by 2050 as Germany Goes Stellarator Maya Posch | usagoldmines...

Speaking Computers from the 1970s Al Williams | usagoldmines.com

Build a Parametric Speaker of Your Own Jenny List | usagoldmines.com

Smartwatches Could Flatten the Curve of the Next Pandemic Navarre Bartz | usagoldmines.com

Shortwave Resurrection: A Sticky Switch Fix on a Hallicrafters Heidi Ulrich | usagoldmines.com

Lawsuit Accusing JPMorgan Chase, Wells Fargo, Bank of America and Zelle of Failing To Protect Custom...

Interposer Helps GPS Receiver Overcome Its Age Arya Voronova | usagoldmines.com

Inexpensive Powder Coating Al Williams | usagoldmines.com

Keebin’ with Kristina: the One with the Schreibmaschine Kristina Panos | usagoldmines.com

It’s 2025, and Here’s a New Film Format Jenny List | usagoldmines.com

LTA’s Pathfinder 1: the Dawn of a New Age of Airships? Maya Posch | usagoldmines.com

Cheap Hackable Smart Ring Gets a Command Line Client Arya Voronova | usagoldmines.com

CNC Router and Fiber Laser Bring the Best of Both Worlds to PCB Prototyping Dan Maloney | usagoldmin...

It’s SSB, But Maybe Not Quite As You Know It Jenny List | usagoldmines.com

Hijacking AirTag Infrastructure To Track Arbitrary Devices Arya Voronova | usagoldmines.com

Make Your Own Air Knife and Air Amplifier Maya Posch | usagoldmines.com

JPMorgan Chase Loses Package Containing Customers’ Sensitive Data, Warns Bank Account Info Could Be ...

Here’s A Spy Movie-Grade Access Card Sniffing Implant Arya Voronova | usagoldmines.com

Deep Space DX Hack Chat Dan Maloney | usagoldmines.com

Sensory Substitution Device Tingles Back Of Your Hand Arya Voronova | usagoldmines.com

12VHPWR Watchdog Protects You From Nvidia Fires Arya Voronova | usagoldmines.com

FOSDEM 2025, A Hardware Hacker’s Haven Arya Voronova | usagoldmines.com

A MicroPython Interpreter For Flipper Zero Arya Voronova | usagoldmines.com

Wake, Boot, Repeat: Remote OS Selection with GRUB and ESP Heidi Ulrich | usagoldmines.com

Flat Pack Toaster Heats Up the Right to Repair Navarre Bartz | usagoldmines.com

Making The Alarmo Customizable, By Any Means Necessary Arya Voronova | usagoldmines.com

Hackaday Links: March 2, 2025 Dan Maloney | usagoldmines.com

On Sensory Weaver Building Arya Voronova | usagoldmines.com

Make Ice Spheres in a Copper Press Navarre Bartz | usagoldmines.com

Leave a Reply