Routers TCP 32764 Backdoor Vulnerability Secretly Re-Activated Again
At the beginning of this year, we reported about the secret backdoor ‘TCP 32764’ discovered in several routers
including, Linksys, Netgear, Cisco and Diamond that allowed an attacker
to send commands to the vulnerable routers at TCP port 32764 from a
command-line shell without being authenticated as the administrator.
The Reverse-engineer from France Eloi Vanderbeken, who discovered
this backdoor has found that although the flaw has been patched in the
latest firmware release, but SerComm has added the same backdoor again
in another way.
To verify the released patch, recently he downloaded the patched
firmware version 1.1.0.55 of Netgear DGN1000 and unpacked it using
binwalk tool. He found that the file ‘scfgmgr’ which contains the
backdoor is still present there with a new option “-l”, that
limits it only for a local socket interprocess communication (Unix
domain socket), or only for the processes running on the same device.
On further investigation via reverse engineering the binaries, he found another mysterious tool called ‘ft_tool’ with “-f”option that could re-activates the TCP backdoor.
In his illustrated report (shown below), he explained that ‘ft_tool’
actually open a raw socket, that listens incoming packages and attackers
on the local network can reactivate the backdoor at TCP port 32764 by sending the following specific packets:
- EtherType parameter should be equal to ‘0x8888’.
- Payload should contains MD5 hash of the value DGN1000 (45d1bb339b07a6618b2114dbc0d7783e).
- The package type should be 0x201.
So, an attacker can reactivate the TCP 32764 backdoor in order to execute the shell commands on the vulnerable SerComm routers even after installing the patched version.
Now question rises, why the routers manufacturers are adding intentional
backdoors again and again?? May be the reason behind to be a helping
hand for the U.S. intelligence agency NSA.
Currently there is no patch available for newly discovered backdoor. If
you want to check your wireless router for this backdoor, you can
download Proof-of-Concept (PoC) exploit released by the researcher from here or follow the below given steps manually:
- Use 'binwalk -e' to extract the file system
- Search for 'ft_tool' or grep -r 'scfgmgr -f
- Use IDA to confirm.
No comments:
Post a Comment