Digital Transformation

Serious security flaw in Wi-Fi driver puts billions of devices at risk

Phan Van Hoa DNUM_AIZAJZCACE 06:29

Recently, Singapore-based cybersecurity company Cyfirma discovered a serious security vulnerability in Microsoft Windows Wi-Fi driver, endangering billions of devices globally.

Accordingly, this security vulnerability can allow attackers to remotely execute arbitrary code (RCE) on vulnerable systems. This vulnerability, coded CVE-2024-30078, has the potential to cause serious damage, including stealing sensitive data, destroying systems, and even taking control of entire networks.

This serious security vulnerability directly affects Wi-Fi drivers on many versions of Microsoft Windows operating systems, from Windows 7 to Windows 11, threatening more than 1.6 billion devices in use worldwide.

Ảnh minh họa
Illustration photo.

Just by being within Wi-Fi range, an attacker can send malicious packets, exploit vulnerabilities to execute arbitrary code on the victim's device, thereby stealing sensitive data, installing malware, or even remotely controlling the system.

How do cybercriminals exploit security vulnerabilities?

The vulnerability CVE-2024-30078 allows attackers to abuse the Dot11Translate80211ToEthernetNdisPacket() function in the native Wi-Fi driver (nwifi.sys) to send specially crafted network packets. When the Windows system receives these packets, the vulnerable function executes malicious code provided by the attacker, allowing them to take complete control of the system.

Exploitation of the CVE-2024-30078 vulnerability has been reported in the United States, China, and several European countries. Attacks targeting healthcare facilities, banks, manufacturing plants, government agencies, and technology companies have caused serious damage, including patient data leaks, financial losses, production disruptions, and even the loss of control of critical systems.

The vulnerability is classified as easily exploitable, meaning that even attackers with little technical expertise can take advantage of it to penetrate the system. With just a few lines of code or an automated tool, attackers can send pre-crafted network packets to devices within their Wi-Fi range to take control of the target device.

The vulnerability, CVE-2024-30078, is related to a bug in the logical link control (LLC) layer of the network stack, specifically in the way packet lengths are handled when operating on virtual networks (VLANs). Due to the discrepancy in determining packet size, an attacker can exploit an out-of-bounds read and a 2-byte overwrite to execute arbitrary code, thereby taking control of the system.

An attacker can exploit the vulnerability in the Dot11Translate80211ToEthernetNdisPacket() function by sending specially crafted network packets that trick the data handling function. In this way, they can overwrite memory addresses containing important information, like changing the address of a house on a map. The attacker can then insert malicious code into this new location, causing the system to execute as intended.

What are the consequences of the CVE-2024-30078 vulnerability?

If successfully exploited, this vulnerability could have a number of serious consequences, affecting both individual users and organizations. One of the most alarming consequences is the ability to install malware. Attackers could remotely deploy a variety of malware, including ransomware and spyware, onto compromised systems.

Even more dangerous, once an attacker has successfully compromised one device, they can easily spread the attack to other devices on the same network. This means they can navigate to other connected devices, gaining access to sensitive data and critical infrastructure.

Another worrying consequence is that a large number of internet-connected devices (such as computers, smartphones, IoT devices) are infected with malware and are remotely controlled by an attacker. This large group of infected devices can then be used to launch large-scale distributed denial of service (DDoS) attacks, bringing down websites, online services, and even critical infrastructure. This not only causes financial losses but also causes major disruptions to everyday life.

In addition, the CVE-2024-30078 vulnerability can lead to serious personal data leakage. Attackers can easily gain unauthorized access to sensitive information such as names, addresses, phone numbers, even financial information and medical records of users, causing serious consequences such as fraud, identity theft or blackmail.

Measures to mitigate the risks caused by the CVE-2024-30078 vulnerability

To protect against the CVE-2024-30078 vulnerability, organizations and individuals need to proactively deploy a comprehensive set of security measures. Combining multiple solutions will significantly reduce risks and enhance data protection.

Apply patches promptly:To deal with the serious vulnerability CVE-2024-30078, Microsoft quickly released a security patch in June 2024. Updating the system to the latest version with this patch is extremely important, because it will help close the vulnerability, preventing attackers from taking advantage of it to penetrate the system.

Enable advanced network security features:Specifically, switching to the latest security standard for Wi-Fi networks (WPA3) will help encrypt data transmitted over Wi-Fi networks more securely. In addition, disabling unnecessary services such as SMB (Server Message Block) file sharing or allowing remote connection and control of another computer over the network (Remote Desktop Protocol) will help reduce the attack surface, protecting the system from remote attacks.

Use strong and unique passwords:A strong password is key to protecting your Wi-Fi network. A strong password, which includes a complex combination of letters, numbers, and special characters, makes it much harder to guess. This helps prevent attackers from accessing your network and stealing information.

Network segmentation:Network segmentation, also known as network partitioning, is the process of dividing a large network into smaller, more secure segments. Network segmentation acts as a protective barrier, preventing the spread of potential attacks. If one part of the network is compromised, segmentation helps limit the scope of the attack, preventing the attacker from spreading to other areas of the network.

Deployment of Intrusion Detection and Prevention System:Implementing an Intrusion Detection and Prevention System (IDPS) not only helps organizations detect suspicious or unusual activity in network traffic, but also proactively stops attacks in progress. IDPS is able to quickly detect signs of vulnerability exploitation and take action to stop the attack before it causes damage.

Regular security and penetration testing:Regular security audits and penetration testing are critical to detecting potential vulnerabilities and weaknesses in network configurations early, so that these issues can be addressed before an attacker can exploit them to compromise the system.

Educate users about cyber security measures:Educating users about cybersecurity measures is an essential part of ensuring information security. Educating users about the specific risks of using Wi-Fi networks, such as phishing attacks, malware, and the importance of complying with security regulations, will help them become a strong barrier against cyberattacks. When users are aware of the dangers and know how to avoid them, the likelihood of security incidents occurring is significantly reduced.

Implementing a zero-trust security model:Unlike traditional security models, the zero-trust model does not trust anyone or any device from the start. Instead, all access to the network must be rigorously and continuously authenticated. This means that even if a device has been granted access before, it must undergo a re-verification process every time it wants to access a new resource. As a result, the zero-trust model significantly reduces the risk of attack, even if an attacker has penetrated a part of the network.

According to Techradar
Copy Link

Featured Nghe An Newspaper

Latest

x
Serious security flaw in Wi-Fi driver puts billions of devices at risk
POWERED BYONECMS- A PRODUCT OFNEKO