{"id":7421,"date":"2021-09-28T12:49:09","date_gmt":"2021-09-28T19:49:09","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7421"},"modified":"2023-04-20T02:26:28","modified_gmt":"2023-04-20T09:26:28","slug":"critical-openssl-vulnerabilities-affecting-linux-and-nas-devices","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/critical-openssl-vulnerabilities-affecting-linux-and-nas-devices\/","title":{"rendered":"Critical OpenSSL Vulnerabilities affecting Linux and NAS devices"},"content":{"rendered":"
On August 24, 2021, Taiwan-based network-attached storage device manufacturer, Synology, reported<\/a> remote code execution (RCE) and denial of service (DoS) OpenSSL vulnerabilities that impacted its products. This news comes in the wake of eCh0raix ransomware attacks<\/a> on QNAP NAS devices between April and June 2021 and on Synology devices since 2019.<\/p>\n Initially, it was unclear how many organizations and products would likely be affected by the flaws. However, soon after, tech giants including QNAP<\/a>, Alpine Linux<\/a>, Debian<\/a>, Red Hat<\/a>, SUSE<\/a>, and Ubuntu<\/a> issued security advisories to inform customers about the impact of the two vulnerabilities.<\/p>\n Tracked as CVE-2021-3711<\/a> and CVE-2021-3712<\/a>, the OpenSSL vulnerabilities allow attackers to take over the flow of an application entirely by tricking it into thinking it has succeeded or failed to execute.<\/p>\n On March 15, 2022, OpenSSL shipped patches for a high severity Denial of Service vulnerability that affects its software library. Dubbed as CVE-2022-0778<\/a> with a CVSS v3 score of 7.5. The flaw affects OpenSSL versions 1.0.2, 1.1.1, and 3.0; was fixed in the released versions of 1.0.2zd (for premium support customers), 1.1.1n, and 3.0.2. Although OpenSSL 1.1.0 is vulnerable, it will not be patched since it is has reached the end of life. While this vulnerability can be definitely weaponized, NSA<\/a> urges users to patch this vulnerability immediately.<\/p>\n CSW researchers studied the OpenSSL vulnerabilities and their impact. Here is our analysis:<\/strong><\/p>\n CVE-2021-3711<\/strong><\/p>\n CVE-2021-3711<\/a> is a heap-based SM2 buffer overflow vulnerability that leads to crashes and also allows attackers to execute arbitrary code.<\/p>\n<\/li>\n Categorized under the weakness enumeration, CWE-120 (Buffer Copy without Checking Size of Input (Classic Buffer Overflow)), the critical severity vulnerability has a CVSS v3 score of 9.8.<\/p>\n<\/li>\n The vulnerability affects OpenSSL versions 1.1.1 and 1.1.1K. The flaw has been fixed<\/a> in v1.1.1J.<\/p>\n<\/li>\n<\/ul>\n CVE-2021-3712<\/strong><\/p>\n CVE-2021-3712<\/a> is a read buffer overrun vulnerability that can be used by attackers to crash vulnerable apps in denial of service (DoS) attacks or gain access to memory contents or sensitive information using private keys.<\/p>\n<\/li>\n Categorized under the weakness enumeration, CWE-125 (Out-of-bounds Read), the high severity vulnerability has a CVSS v3 score of 7.4.<\/p>\n<\/li>\n The vulnerability affects OpenSSL versions 1.1.1 and 1.1.1K. The flaw has been fixed<\/a> in v1.1.1J.<\/p>\n<\/li>\n<\/ul>\n <\/p>\n \u201cIf one is looking at NVD alone, which quotes OpenSSL, NetApp, and Debian products only, the real impact of such vulnerabilities is not provided. We should remember that since OpenSSL is a library used by multiple third-party products like Synology and QNAP, we may tend to miss out on reporting the complete list of impacted products.\u201d<\/strong><\/p>\n \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 ~ a CSW expert opinion<\/p>\n<\/blockquote>\n NAS device manufacturers, Synology and QNAP, reported that the vulnerabilities were impacting multiple products. Both companies are working on patches for the vulnerabilities. Here is a detailed list of the products affected:<\/strong><\/p>\n <\/strong><\/p>\n \u201cThe impact that ransomware gangs may have by exploiting OpenSSL bugs will be, in most likelihood, huge, since NAS devices are widely used for data backups. Although there are no known exploits in the wild at the moment, we believe that all the chatter on underground forums about these vulnerabilities portends an imminent attack within the next few months.\u201d\u00a0 \u00a0\u00a0\u00a0\u00a0<\/strong><\/p>\n \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 ~ CSW Analyst\u2019s viewpoint<\/p>\n<\/blockquote>\n CSW\u2019s expertise and thought leadership regarding the spate of attacks targeting OpenSSL bugs and what it portends has been quoted<\/a> recently.<\/p>\n With criminal gangs like eCh0raix ransomware and botnet malware like StealthBot<\/a> knocking at the doors of NAS device manufacturers and Linux products, it is imperative that companies patch their systems or upgrade to the latest versions in order to prevent any ransomware groups which may leverage the OpenSSL vulnerabilities.<\/p>\n Attackers require one vulnerability to exploit and take advantage of an organization. Organizations, as a result, should adopt a risk-based approach and manage the vulnerabilities in their attack surfaces to boost their security posture.<\/p>\n <\/p>\nRecent Developments<\/strong><\/h2>\n
New OpenSSL vulnerability<\/strong><\/h2>\n
Our Findings<\/strong><\/h2>\n
\n
\n
Products and Vendors Affected by the OpenSSL flaws<\/strong><\/h2>\n
Way Forward<\/strong><\/h2>\n