OpenWrt: Attackers could have infected certain images with malicious code

Due to a bug, OpenWrt images prepared with malicious code could have come into circulation. The security problem has now been solved.

listen Print view
Magnifying,Glass,Enlarging,Malware,In,Computer,Machine,Code

(Image: Balefire / Shutterstock.com)

2 min. read

A"critical" vulnerability in OpenWrt's SysUpgrade server jeopardized the integrity of some firmware images. A security researcher discovered vulnerabilities in the build process. The OpenWrt developers have now closed the gap.

OpenWrt is an alternative Linux-based firmware for certain router models, among others. In a warning message, the developers write that a security researcher from Flat Security has discovered the vulnerability (CVE-2024-54143). The bug can be found in the SysUpgrade feature. This allows users to create new firmware images that adopt previously installed packages and settings with comparatively little effort and in a manageable amount of time.

The security researcher states in a report that the sysupgrade.openwrt.org service runs in a container environment. Due to insufficient checks, attackers can insert their own code into images at this point using the "make" command. He also discovered that the service uses a SHA256 hash shortened to twelve digits for caching. Because the hash is thus limited to 48 bits, attackers can generate a hash collision using brute force attacks.

Videos by heise

According to the security researcher, the combination of these two factors enabled him to create a legitimate-looking but manipulated firmware image. If this is used to replace an official image in the context of the sysupgrade.openwrt.org service, users are unaware of this and their devices are compromised after installation.

The OpenWrt developers state that attackers do not need to be authenticated for this. However, the prerequisite is that they must be able to transmit build requests with manipulated package lists. What this means in detail and how such an attack could take place is not currently specified.

The developers assure us that they solved the security problem just a few hours after it was reported by the security researcher. They assume that no manipulated images have come into circulation. Nevertheless, users who have recently installed firmware created with SysUpgrade should perform an in-place upgrade of the same firmware version.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.