18. January 2022

This article has been indexed from

CySecurity News – Latest Information Security and Hacking Incidents

A critical flaw in KCodes NetUSB kernel module could allow attackers to secure remote access and has the capability to infect millions of devices. 

Researchers from SentineLabs published a report on the remote code execution vulnerability, tracked as CVE-2021-45388, identified in software vendor KCodes’ NetUSB kernel module. NetUSB is a kernel module connectivity solution developed by KCodes, allowing remote devices in a network to interact with the USB devices directly plugged into a router. 

NetUSB is used by millions of router devices from various vendors, including Netgear, TP-Link and Western Digital, to provide USB-over-IP functionality. While SentinelOne has not noticed any attacks in the wild, the team determined that the threat actor could alter the code that the router would then execute. 

The SentinelOne report noted three limitations that make it difficult to exploit the vulnerability, such as “the structure must be sprayable from a remote perspective.” “While these restrictions make it difficult to write an exploit for this vulnerability, we believe that it isn’t impossible, and so those with Wi-Fi routers may need to look for firmware updates for their router,” re

[…]

Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: