Breaking
April 26, 2025

This Week in Security: XRP Poisoned, MCP Bypassed, and More Jonathan Bennett | usagoldmines.com

Researchers at Aikido run the Aikido Intel system, an LLM security monitor that ingests the feeds from public package repositories, and looks for anything unusual. In this case, the unusual activity was five rapid-fire releases of the xrpl package on NPM. That package is the XRP Ledger SDK from Ripple, used to manage keys and build crypto wallets. While quick point releases happen to the best of developers, these were odd, in that there were no matching releases in the source GitHub repository. What changed in the first of those fresh releases?

The most obvious change is the checkValidityOfSeed() function added to index.ts. That function takes a string, and sends a request to a rather odd URL, using the supplied string as the ad-referral header for the HTML request. The name of the function is intended to blend in, but knowing that the string parameter is sent to a remote web server is terrifying. The seed is usually the root of trust for an individual’s cryptocurrency wallet. Looking at the actual usage of the function confirms, that this code is stealing credentials and keys.

The releases were made by a Ripple developer’s account. It’s not clear exactly how the attack happened, though credential compromise of some sort is the most likely explanation. Each of those five releases added another bit of malicious code, demonstrating that there was someone with hands on keyboard, watching what data was coming in.

The good news is that the malicious releases only managed a total of 452 downloads for the few hours they were available. A legitimate update to the library, version 4.2.5, has been released. If you’re one of the unfortunate 452 downloads, it’s time to do an audit, and rotate the possibly affected keys.

Zyxel FLEX

More specifically, we’re talking about Zyxel’s USG FLEX H series of firewall/routers. This is Zyxel’s new Arm64 platform, running a Linux system they call Zyxel uOS. This series is for even higher data throughput, and given that it’s a new platform, there are some interesting security bugs to find, as discovered by [Marco Ivaldi] of hn Security and [Alessandro Sgreccia] at 0xdeadc0de. Together they discovered an exploit chain that allows an authenticated user with VPN access only to perform a complete device takeover, with root shell access.

The first bug is a wild one, and is definitely something for us Linux sysadmins to be aware of. How do you handle a user on a Linux system, that you don’t want to have SSH access to the system shell? I’ve faced this problem when a customer needed SFTP access to a web site, but definitely didn’t need to run bash commands on the server. The solution is to set the user’s shell to nologin, so when SSH connects and runs the shell, it prints a message, and ends the shell, terminating the SSH connection. Based on the code snippet, the FLEX is doing something similar, perhaps with -false set as the shell instead:

$ ssh user@192.168.169.1
(user@192.168.169.1) Password:
-false: unknown program '-false'
Try '-false --help' for more information.
Connection to 192.168.169.1 closed.

It’s slightly janky, but seems set up correctly, right? There’s one more step to do this completely: Add a Match entry to sshd_config, and disable some of the other SSH features you may not have thought about, like X11 forwarding, and TCP forwarding. This is the part that Zyxel forgot about. VPN-only users can successfully connect over SSH, and the connection terminates right away with the invalid shell, but in that brief moment, TCP traffic forwarding is enabled. This is an unintended security domain transverse, as it allows the SSH user to redirect traffic into internal-only ports.

Next question to ask, is there any service running inside the appliance that provides a pivot point? How about PostgreSQL? This service is set up to allow local connections on port 5432 — without a password. And PostgreSQL has a wonderful feature, allowing a COPY FROM command to specify a function to run using the system shell. It’s essentially arbitrary shell execution as a feature, but limited to the PostgreSQL user. It’s easy enough to launch a reverse shell to have ongoing shell access, but still limited to the PostgreSQL user account.

There are a couple directions exploitation can go from there. The /tmp/webcgi.log file is accessible, which allows for grabbing an access token from a logged-in admin. But there’s an even better approach, in that the unprivileged user can use the system’s Recovery Manager to download system settings, repack the resulting zip with a custom binary, re-upload the zip using Recovery Manager, and then interact with the uploaded files. A clever trick is to compile a custom binary that uses the setuid(0) system call, and because Recovery Manager writes it out as root, with the setuid bit set, it allows any user to execute it and jump straight to root. Impressive.

Power Glitching an STM32

Micro-controllers have a bit of a weird set of conflicting requirements. They need to be easily flashed, and easily debugged for development work. But once deployed, those same chips often need to be hardened against reading flash and memory contents. Chips like the STM32 series from ST Microelectronics have multiple settings to keep chip contents secure. And Anvil Secure has some research on how some of those protections could be defeated. Power Glitching.

The basic explanation is that these chips are only guaranteed to work when run inside their specified operating conditions. If the supply voltage is too low, be prepared for unforeseen consequences. Anvil tried this, and memory reads were indeed garbled. This is promising, as the memory protection settings are read from system memory during the boot process. In fact, one of the hardest challenges to this hack was determining the exact timing needed to glitch the right memory read. Once that was nailed down, it took about 6 hours of attempts and troubleshooting to actually put the embedded system into a state where firmware could be extracted.

MCP Line Jumping

Trail of Bits is starting a series on MCP security. This has echoes of the latest FLOSS Weekly episode, talking about agentic AI and how Model Context Protocol (MCP) is giving LLMs access to tools to interact with the outside world. The security issue covered in this first entry is Line Jumping, also known as tool poisoning.

It all boils down to the fact that MCPs advertise the tools that they make available. When an LLM client connects to that MCP, it ingests that description, to know how to use the tool. That description is an opportunity for prompt injection, one of the outstanding problems with LLMs.

Bits and Bytes

Korean SK Telecom has been hacked, though not much information is available yet. One of the notable statements is that SK Telecom is offering customers a free SIM swapping protection service, which implies that a customer database was captured, that could be used for SIM swapping attacks.

WatchTowr is back with a simple pre-auth RCE in Commvault using a malicious zip upload. It’s a familiar story, where an unauthenticated endpoint can trigger a file download from a remote server, and file traversal bugs allow unzipping it in an arbitrary location. Easy win.

SSD Disclosure has discovered a pair of Use After Free bugs in Google Chrome, and Chrome’s Miracleptr prevents them from becoming actual exploits. That technology is a object reference count, and “quarantining” deleted objects that still show active references. And for these particular bugs, it worked to prevent exploitation.

And finally, [Rohan] believes there’s an argument to be made, that the simplicity of ChaCha20 makes it a better choice as a symmetric encryption primitive than the venerable AES. Both are very well understood and vetted encryption standards, and ChaCha20 even manages to do it with better performance and efficiency. Is it time to hang up AES and embrace ChaCha20?

 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

Hash Functions with the Golden Ratio Bryan Cockfield | usagoldmines.com

7,605 Bank Customers Receive Urgent Data Breach Alerts After ‘Administrative Error’ Exposes Social S...

XOR Gate as a Frequency Doubler Al Williams | usagoldmines.com

Retired NBA Star Shaquille O’Neal Settles FTX Endorsement Lawsuit for Undisclosed Amount Rhodilee Je...

Robot Gets a DIY Pneumatic Gripper Upgrade Lewin Day | usagoldmines.com

Hackaday Podcast Ep 318: DIY Record Lathe, 360 Degree LIDAR, and 3D Printing Innovation Lives! Jenny...

Sigrok Website Down After Hosting Data Loss Maya Posch | usagoldmines.com

You Wouldn’t Steal a Font… Jenny List | usagoldmines.com

Posthumous Composition Being Performed by the Composer Seth Mabbott | usagoldmines.com

Clickspring’s Experimental Archaeology: Concentric Thin-Walled Tubing Dan Maloney | usagoldmines.com

Adding an Atari Joystick Port to TheC64 USB Joystick Lewin Day | usagoldmines.com

LLMs Coming for a DNA Sequence Near You Navarre Bartz | usagoldmines.com

3D Printing A Useful Fixturing Tool Lewin Day | usagoldmines.com

Onkyo Receiver Saved With An ESP32 Lewin Day | usagoldmines.com

DolphinGemma Seeks to Speak to Dolphins Navarre Bartz | usagoldmines.com

A Bicycle is Abandonware Now? Clever Hack Rescues Dead Light Jenny List | usagoldmines.com

From PostScript to PDF Al Williams | usagoldmines.com

Haptic Soft Buttons Speak(er) to Your Sense of Touch Tyler August | usagoldmines.com

The Mohmmeter: A Steampunk Multimeter Matt Varian | usagoldmines.com

C64 Assembly in Parts Al Williams | usagoldmines.com

Improved and Open Source: Non-Planar Infill for FDM Heidi Ulrich | usagoldmines.com

Abusing DuckDB-WASM To Create Doom In SQL Maya Posch | usagoldmines.com

The Evertop: a Low-Power, Off-Grid Solar Gem Heidi Ulrich | usagoldmines.com

FLOSS Weekly Episode 830: Vibes Jonathan Bennett | usagoldmines.com

Open Source Commercial Synthesisers You Will Love Jenny List | usagoldmines.com

To See Within: Detecting X-Rays Dan Maloney | usagoldmines.com

Unsolved Questions in Astronomy? Try Dark Matter! Tyler August | usagoldmines.com

A Scratch-Built Commodore 64, Turing Style Dan Maloney | usagoldmines.com

Virtual Nodes, Real Waves: a Colpitts Walkthrough Heidi Ulrich | usagoldmines.com

How Supercritical CO2 Working Fluid Can Increase Power Plant Efficiency Maya Posch | usagoldmines.co...

eInk PDA Revisited Fenix Guthrie | usagoldmines.com

DIY Record Cutting Lathe is Really Groovy Tyler August | usagoldmines.com

British Wartime Periscope: a Peek Into the Past Heidi Ulrich | usagoldmines.com

Game Boy PCB Assembled With Low-Cost Tools Bryan Cockfield | usagoldmines.com

27% of Bybit Hacked Funds Have ‘Gone Dark’ After Flowing Through Mixers and Bridges, According to CE...

Why Physical Media Deserved To Die Maya Posch | usagoldmines.com

What’s Sixty Feet Across and Superconducting? Tyler August | usagoldmines.com

Making A One-Of-A-Kind Lime2 SBC Matt Varian | usagoldmines.com

Making Your Own Light Bulb Using a Jar, a Pencil, and Two Bolts John Elliot V | usagoldmines.com

PoX: Super-Fast Graphene-Based Flash Memory Maya Posch | usagoldmines.com

Jolly Wrencher Down to the Micron Ian Bos | usagoldmines.com

Trekulator: A Reproduction of the 1977 Star Trek Themed Calculator John Elliot V | usagoldmines.com

Remembering UCSD p-System, the Pascal Virtual Machine Maya Posch | usagoldmines.com

Keebin’ with Kristina: the One with the Part Picker Kristina Panos | usagoldmines.com

Crypto Rug Pull Losses Have Soared 6,499% This Year Despite Decrease in Frequency, Says DappRadar Rh...

Restoration of Six-Player Arcade Game From the Early 90s Bryan Cockfield | usagoldmines.com

Biasing Transistors with Current Sources John Elliot V | usagoldmines.com

Printed Perpetual Calendar Clock Contains Clever Cams Tyler August | usagoldmines.com

Preventing Galvanic Corrosion in Water Cooling Loops Maya Posch | usagoldmines.com

China Hosts Robot Marathon Al Williams | usagoldmines.com

Hackaday Links: April 20, 2025 Dan Maloney | usagoldmines.com

milliForth-6502, a Forth for the 6502 CPU John Elliot V | usagoldmines.com

The Most Printable 3D Printer Yet Aaron Beckendorf | usagoldmines.com

Low Cost Oscilloscope Gets Low Cost Upgrades Bryan Cockfield | usagoldmines.com

Building a Custom Zynq-7000 SoC Development Board from the Ground Up John Elliot V | usagoldmines.co...

Non-planar Slicing is for the Birds Tyler August | usagoldmines.com

Rockbox 4.0 Released John Elliot V | usagoldmines.com

Frankenflair 58: Manual Roots, Advanced Brew Matt Varian | usagoldmines.com

China’s TMSR-LF1 Molten Salt Thorium Reactor Begins Live Refueling Operations Maya Posch | usagoldmi...

They Hacked a Nuclear Power Plant! Whoops! Don’t Make a Sound! John Elliot V | usagoldmines.com

Controversial Exchange eXch To Shutter in May Amid Allegations the Project Laundered Crypto Stolen i...

$100,000 Drained From Bank Accounts At Wells Fargo, Bank of America and Other US Banks in One US Cou...

Hydroplaning RC Jet boat Steers Clear of Convention Seth Mabbott | usagoldmines.com

100,000 Americans Exposed As Auto Giant Warns Customers’ Names, Contact Details, Credit Card Informa...

JPMorgan Chase, BNY Mellon Respond To Major Data Breach After Bank Regulator Abruptly Suffers Securi...

Vibing, AI Style Elliot Williams | usagoldmines.com

Will it Run Llama 2? Now DOS Can Tyler August | usagoldmines.com

Open Source DMR Radio Al Williams | usagoldmines.com

Restoring an Abandoned Game Boy Kiosk Maya Posch | usagoldmines.com

Haircuts in Space: How to Keep Your Astronauts Looking Fresh Maya Posch | usagoldmines.com

Robot Picks Fruit and Changes Light Bulbs with Measuring Tape Tyler August | usagoldmines.com

A Pi-Based LiDAR Scanner Bryan Cockfield | usagoldmines.com

Vintage Game Rides Again Thanks to Modern Tech Dan Maloney | usagoldmines.com

Hackaday Podcast Episode 317: Quantum Diamonds, Citizen Science, and Cobol to AI Al Williams | usago...

Presence Detection Augments 1930s Home Bryan Cockfield | usagoldmines.com

This Week in Security: No More CVEs, 4chan, and Recall Returns Jonathan Bennett | usagoldmines.com

D20-shaped Quasicrystal Makes High-Strength Alloy Printable Tyler August | usagoldmines.com

Track Your Circuits: A Locomotive PCB Badge Matt Varian | usagoldmines.com

Tiny, Hackable Telepresence Robot for under $100? Meet Goby Donald Papp | usagoldmines.com

Rise of the Robots: How Robots Are Changing Dairy Farms Maya Posch | usagoldmines.com

A Blacksmith Shows Us How To Choose An Anvil Jenny List | usagoldmines.com

Designing an FM Drum Synth from Scratch Dan Maloney | usagoldmines.com

Bicycle Gearbox Does it by Folding Fenix Guthrie | usagoldmines.com

Supercon 2024: Exploring the Ocean with Open Source Hardware Tom Nardi | usagoldmines.com

Budget Schlieren Imaging Setup Uses 3D Printing to Reveal the Unseen Tyler August | usagoldmines.com

Modernizing an Enigma Machine Matt Varian | usagoldmines.com

Using a MIG Welder, Acetylene Torch, and Air Hammer to Remove a Broken Bolt John Elliot V | usagoldm...

An Absolute Zero of a Project Dan Maloney | usagoldmines.com

GK STM32 MCU-Based Handheld Game System Maya Posch | usagoldmines.com

Making a Variable Speed Disc Sander from an Old Hard Drive John Elliot V | usagoldmines.com

FLOSS Weekly Episode 829: This Machine Kills Vogons Jonathan Bennett | usagoldmines.com

SpaceMouse Destroyed for Science Fenix Guthrie | usagoldmines.com

Porting COBOL Code and the Trouble With Ditching Domain Specific Languages Maya Posch | usagoldmines...

Homemade VNA Delivers High-Frequency Performance on a Budget Dan Maloney | usagoldmines.com

Binner Makes Workshop Parts Organization Easy Matt Varian | usagoldmines.com

Something is Very Wrong With the AY-3-8913 Sound Generator Maya Posch | usagoldmines.com

Replica of 1880 Wireless Telephone is All Mirrors, No Smoke Tyler August | usagoldmines.com

DIY AI Butler Is Simpler and More Useful Than Siri Donald Papp | usagoldmines.com

Making Parts Feeders Work Where They Weren’t Supposed To Lewin Day | usagoldmines.com

A New Kind of Bike Valve? Fenix Guthrie | usagoldmines.com

Leave a Reply